Journal 1
The NICE Workforce Framework is used as a resource by organizations to build effective cybersecurity measures. NICE consists of 7 broad categories that include several specialized areas: Analyze, Collect and Operate, Investigate, Operate and Maintain, Oversee and Govern, Protect and Defend, Securely Provision. The Analyze category emphasizes critical thinking skills and problem-solving abilities. Individuals in roles within this category are expected to analyze complex issues, assess information, and develop effective solutions. This is appealing to me because I enjoy intellectually challenging work and finding creative solutions to cybersecurity problems, even though I am at an amateur level. Another interesting area that stood out to me was Collect and Operate. Jobs within the Collect and Operate category often involve diverse tasks, such as gathering and analyzing data, managing systems, and ensuring the proper functioning of cybersecurity tools. This variety can be appealing for individuals who enjoy a dynamic and multifaceted work environment. A category that I don’t find as appealing is Oversee and Govern. I enjoy working with technology hands-on and the managerial and oversight aspects of this category seems less satisfying. The focus on governance and strategy may mean less direct involvement in technical implementation.
Journal 2
Many facets of cybersecurity are supported by scientific concepts, which offer an organized and fact-based method for comprehending, reducing, and handling cyber threats. The discipline of cybersecurity is founded on scientific concepts, including observation, hypothesis testing, experimentation, and empirical evidence. In cybersecurity, observation entails keeping an eye on and evaluating system behaviors, network activity, and potential vulnerabilities. Identifying possible risks and developing countermeasures are clear examples of hypothesis testing in action. In order to evaluate the efficacy of security policies and measures, experimentation is necessary. Validating the effectiveness of security solutions and fine-tuning defensive methods based on actual data require empirical evidence.
Moreover, cybersecurity experts utilize the scientific approach in forensic investigations and incident response, where they reconstruct events, gather data, and make conclusions. The scientific method’s iterative structure complements cybersecurity’s dynamic environment by highlighting constant progress and adaption to new threats. In conclusion, scientific principles offer cybersecurity professionals a strict framework for methodically analyzing, comprehending, and reacting to cyber threats, encouraging a methodical and evidence-based approach to protecting digital environments.
Journal 3
A thorough database of publicly accessible information about data breaches is offered by PrivacyRights.org. It includes information about the kinds of information that was compromised, the businesses that were impacted, the nature and extent of the incidents, and more. Researchers can use this data to carry out in-depth analyses of data breaches and improve their comprehension of cybersecurity trends, patterns, and vulnerabilities. Researchers can examine the industries or sectors most vulnerable to breaches, find common attack vectors, and evaluate the effects of various compromise types on people and organizations by examining the data provided on the website. The data can also be useful for assessing the efficacy of security precautions and comprehending the changing strategies used by hackers. Researchers may also utilize this data to create frameworks or predictive models that can help detect and stop breaches in the future in a proactive manner. In general, PrivacyRights.org is a useful tool for scholars who want to learn more about the characteristics of data breaches and enhance cybersecurity procedures.
Journal 4
Maslow’s Hierarchy of Needs, which divides needs into five levels—physiological, safety, love and belonging, esteem, and self-actualization—offers a psychological framework for comprehending human motivation. When I use this framework to analyze my technological experiences, the links between these levels become clear. Technology satisfies fundamental physiological demands like information availability and communication. Digital gadgets facilitate instantaneous communication and offer prompt access to essential resources such as news and health information. Cybersecurity procedures safeguard online transactions and personal data in order to meet safety needs. Social media platforms assist in addressing the desire for interpersonal interactions by facilitating connections in the area of love and belonging. A sense of belonging is enhanced by friendships, online support groups, and digital communities. Technology satisfies wants for self-esteem by offering chances for skill improvement, online platform recognition, and the capacity to display accomplishments or expertise.
In terms of self-actualization, technology provides learning and personal development resources. People can follow their passions and develop themselves with the help of online classes, creative platforms, and knowledge-sharing groups.
In conclusion, Maslow’s Hierarchy of wants is evident in my experiences with technology, showing how digital technologies meet essential human wants ranging from potential for self-fulfillment in the digital age to social connections, acknowledgment, and basic survival and safety.
Journal 5
Money (1): Since illegal operations like ransomware, financial fraud, and the theft of sensitive data can result in large gains, financial gain is frequently the main motivation for cybercriminals.
Recognition (2): In the hacker community, some cybercriminals aim to get a reputation or recognition. They can get more respect from their peers by launching well-publicized attacks or showcasing their advanced abilities.
Entertainment (3): Although there are cases of hacking for amusement, these are usually less frequent than cybercrimes driven by money or the need for attention. The allure of adventure and difficulty, though, can still be a powerful motivation.
Revenge (4): Cyberattacks motivated by retribution might happen, for example, when unhappy workers want to exact revenge on their employers. Although this motivation is grave, it is not as common as money motivations.
Politics (5): Although politically driven cyberattacks, such as hacktivism, are possible, they cannot occur as frequently as attacks with financial motivations. Political motivations are very diverse and may not necessarily provide the offender with observable benefits.
Boredom (6): While some people may use the internet for recreational purposes, this is usually a less prevalent and less appealing motivation than fame or money.
Multiple Motives (7): Although some cybercriminals may have more than one motivation, placing it lower suggests that the main motivator—be it money, fame, or another factor—usually takes precedence. Several motivations could make analysis and attribution more difficult.\
Journal 6
http://zapatopi.net/treeoctopus
Many red flags are frequently present on fake websites, including:
URL discrepancies: When compared to authentic websites, fake websites may have slightly changed or misspelled their URLs. Look for minor variations in domain names.
Inadequate Design and Quality: Reputable websites usually make a professional design investment. False websites may have inconsistent font, color, and imagery, as well as poor layout, graphics, and general quality.
Absence of HTTPS: Reputable websites use HTTPS and place a high priority on security. Without this encryption, a website can raise red flags, particularly when handling private data like credit card numbers or passwords.
On the other hand, authentic websites usually possess:
Precise URLs: Reputable websites consistently have properly spelled URLs. Make sure the web URL corresponds to the official domain by verifying it.
Professional Design: Reputable websites invest in a well-thought-out and accessible layout. The website exhibits a dedication to providing a satisfactory user experience with its well-structured layout and superior graphics.
Secure Connection: Legitimate websites encrypt data using HTTPS to provide safe communication. Check the address bar for the padlock icon.
Journal 7
My meme represents the human component of Cybersecurity. Somebody hired this person to protect their network security and they are doing a great job at doing it.
Journal 8
As I consider the complex relationship between media and our understanding of cybersecurity, I can’t help but think about the enormous influence that different media outlets have over our understanding as a whole. With its wide audience and powerful influence, the media is a major factor in how the general public views cybersecurity. News stories, TV series, and memes can all be used to either clarify or misrepresent the complicated world of digital security. Media sources frequently act as a bridge between the general public and the arcane field of cybersecurity. While some sources conscientiously inform the public about new risks and effective practices, others exaggerate events and spread false information, inciting panic and confusion. This dichotomy adds to the complex story’s oscillation between awareness and anxiety.
Furthermore, our societal stereotype of hackers and cybersecurity experts is shaped by how these people are portrayed in popular culture. Whether it’s the slick hacker-hero or the sinister cybercriminal, these representations shape our understanding of people who work in the digital sphere.
Understanding the dynamic relationship between cybersecurity awareness and the media means that we must approach information critically and discern between dramatic storylines and factual reporting. We can only develop a knowledgeable society that is able to safely and confidently traverse the digital terrain by using a critical lens.
Journal 9
I scored a 2/9 on the Social Media Disorder Scale. The items on the scale were very thought provoking in the sense that I know several people that would most likely score a 9/9. Different patterns of social media disorder around the world are most likely caused by differences in internet access in certain areas. This could also be due to cultural differences where certain people value things more than others.
Journal 10
The article emphasizes the necessity of thorough education about the decentralized structure of the contemporary information environment, stressing the importance of military training firsthand and raising awareness among the general public. Given the dangers present in this setting, it is imperative that people carefully verify the information they find. The multidisciplinary approach to social cybersecurity that has been suggested promotes a comprehensive plan that is backed by pertinent laws. It is believed that resolving the fabricated mistrust between the military and civilians is essential to collective defense. The paper makes the case for the Department of Defense’s proactive participation in an interagency, cooperative effort to address today’s information concerns. Essentially, social cybersecurity becomes an essential field that is critical to securing a resilient future and managing the intricacies of the digital era.
Journal 11
Economic Theories:
The letter’s description of the customer response can be understood through the use of behavioral economics. In this instance, the organization’s decision-making process’ behavioral component is evident in the clients’ delayed notice owing to the continuing investigation. Behavioral economic concepts are in line with an understanding of the psychology of customer reactions, including potential concerns and self-protective behaviors.
The strategic interactions between many stakeholders can be understood via the lens of game theory. Game theory can be used to examine the dynamics between the corporation, its platform provider, and law enforcement in the context of the data breach. The choice to postpone notifying customers, which may have been motivated by law enforcement concerns, shows calculated reactions to the event and incorporates aspects of game theory into decision-making.
Social Sciences Theories:
Potential conflicts arising from the delayed consumer notification and the power dynamics between the company and its platform provider could be interpreted using conflict theory. The letter highlights the power struggles and tensions between the private company, legal authorities, and client interests, while also mentioning the presence of law enforcement. This aligns with the emphasis of conflict theory on systemic injustices.
The study of risk society theory looks at how contemporary societies manage uncertainty and dangers. This hypothesis can be used to examine the data breach incidence, the delayed detection, and the subsequent customer notification. The focus placed on protecting personal data and the advice given to customers to take prompt action are reflections of how society has responded to the threats posed by the digital age, where concerns over data breaches have become commonplace.
Journal 12
The five most serious offenses I see in no particular order are faking your identity online, collecting information about children, sharing passwords, addresses, or photos of others, using other people’s internet networks, and using unofficial streaming services. Out of all of these, I would say collecting information about a child would be the biggest red flag out of these. Pedophiles and child abductors are pretty high on my list of disgusting people and I don’t think much else needs to be said. Stealing identities and sharing personal information of others such as passwords can quite literally destroy someone’s life. If the wrong person gets ahold of your information, then there’s no telling how much damage they could do. The last two potential illegal searches have to do with stealing profit from individuals and companies. Pirating streams and internet networks can hurt the economy if done in mass. All the items on the list are things people without integrity would partake in, but these five I mentioned are especially damaging to society.
Journal 13
The speaker, David Teo, found his profession a lot like I hope to find mine eventually. He diversified his portfolio and skillset in order to secure better positions in better organizations until he found his niche. He worked hard and it eventually led him to something e enjoyed doing. Just like me, and many other people, he did not know what he wanted to do for the rest of his life early on and for a good amount of his career. Having a calling or a passion for something your can make a living off of is a huge blessing that only some have and even less can turn into fruition. Because of this, one of my main takeaways from this TedTalk is that if you work hard enough in everything you do, then the right people will eventually recognize you and your calling will be revealed to you.




