Week 1 Journal
There are few areas from the NICE framework that I want to focus my career on. One being under Implementation Operatations (IO) – Data analysis: which focuses on analyzing data from multiple sources to cybersecurity and insight. This directly aligns with some of my goals once I get into the workforce and start to move up in my career. Another Under (IO) is Network Operations which is responsible for operating network services, systems, and virtual environments. This aligns with my skills and what I want to do with my career.
One of the areas that didn’t appeal to me as much was the Incident Response under Protection and Defense, which is responsible for investigating/responding to incidents. I like this but I don’t see I would want to dive to deep into incident response just yet.
Week 2
Explain how the principles of science relate to cybersecurity?
The principles of science relate to cybersecurity in several ways. Empirical observation and hypothesis testing help identify and address security concerns. Reproducibility ensures that security measures are reliable and effective. Logical reasoning and Mathematical Modeling are essential for developing robust security protocols. Those are just a few ways principles of science relate to cybersecurity.
Week 3
After visiting PrivacyRights.org there is so much info available like what kind of data was exposed, how the breach happened, and even how companies responded. I can see researchers using this to spot trends, like which industries get hit hardest or what types of data are most often compromised. With having all this raw data, they could even build models to predict future breaches or suggest better security measures. It’s cool to think that something so public could actually help make our digital world a bit safer.
Week 4 Journal
Maslow’s Hierarchy of Needs and Technology
Maslow’s Hierarchy of Needs explains human motivation in five levels, and technology plays a role in fulfilling each of them. Here’s how my digital experiences relate to each level:
- Physiological Needs – Apps like DoorDash and Instacart make food access convenient, while smart home devices manage lighting and temperature for comfort. Fitness trackers and health apps also help monitor sleep, hydration, and exercise.
- Safety Needs – I rely on VPN s, two-factor authentication, and antivirus software to protect my online presence. Security cameras, emergency alerts, and GPS tracking apps provide physical security, while encrypted messaging ensures private communication.
- Love & Belonging – Social media, messaging apps, and video calls help maintain relationships with family, friends, and classmates. Online communities, gaming, and virtual study groups creates connections and a sense of belonging.
- Esteem Needs – Platforms like LinkedIn Learning, Coursera, and cybersecurity certifications help build skills and career confidence. Social media engagement, online portfolios, and academic achievements provide recognition and validation.
- Self-Actualization – I use coding platforms, cybersecurity research, and online forums to refine my expertise and pursue career goals. Creative outlets like blogging, video editing, and digital art platforms help with personal expression and continuous growth.
Technology is integrated into every level, shaping my daily life, security, relationships, achievements, and long-term aspirations.
Week 6 Journal Entry: Identifying Fake Websites
Introduction
Fake websites are a major tool for cybercriminals, often used for phishing and fraud. They mimic real sites but have subtle differences that expose their illegitimacy. This entry compares three fake websites with their real counterparts and highlights key warning signs.
Fake vs. Real Websites
- Fake: “amaz0n-login.com” | Real: “amazon.com”
The fake site replaces “o” with “0” in the URL and lacks HTTPS security. It mimics Amazon’s design but has distorted images and fake login prompts. The real Amazon site uses HTTPS, has a proper SSL certificate, and offers secure authentication. - Fake: “paypal-verification.com” | Real: “paypal.com”
The fake site tricks users into entering credentials by claiming urgent account issues. It uses phishing tactics and an unofficial domain. The real PayPal site never asks for login verification via random links and has strong authentication. - Fake: “bank-secure-login.com” | Real: “bankofamerica.com”
Fake banking sites use misleading URLs and ask for sensitive details. They often contain poor grammar and generic greetings. The real Bank of America site has consistent branding, secure login, and never requests confidential data via unsecured forms.
Key Signs of a Fake Website
- Suspicious URLs – Misspellings, extra words, or odd subdomains.
- No HTTPS Security – Lacks the padlock icon, making data vulnerable.
- Poor Design & Content – Blurry images, typos, and inconsistent branding.
- Unusual Requests – Asking for unnecessary personal or financial details.
- Urgent, Fear-Based Messages – Pressures users to act quickly.
Conclusion
Fake websites are common in cyber scams. Always verify URLs, check for HTTPS security, and avoid clicking suspicious links. Staying alert is the best defense against phishing and fraud.
Week 8 Journal
The media, especially movies and TV shows, has a profound impact on how we perceive cybersecurity. From the exaggerated portrayals of hackers to the over-the-top depictions of digital warfare, media often distorts the reality of cybersecurity. After watching the video, I realized how much these depictions simplify complex processes like hacking, making it look like a quick, flashy activity. Hackers are often portrayed as lone geniuses, performing impossible feats with ease, which creates unrealistic expectations about what cybersecurity professionals do. In reality, hacking involves long hours of research, testing, and trial-and-error. These distortions can lead to misconceptions about both the risks of cyber threats and the skills needed to protect against them. It’s important for the public to understand that cybersecurity is a multifaceted and ongoing effort, not something solved in a dramatic 60-second montage. As a result, the media influences our understanding in ways that may both inspire and mislead.
Week 10 Journal: SMDC
I scored a 3/9 on the Social Media Disorder Scale, which means social media doesn’t really disrupt my life. I don’t obsess over it, and I don’t feel the need to spend more time on it than I do. If I can’t use it, I don’t really miss it, and I haven’t had any issues trying to cut back. It hasn’t caused any problems with relationships, and I’m pretty open about how much time I spend online.
The questions on the scale made me think about how social media can take over if you’re not careful. I think patterns probably vary a lot around the world because social media plays different roles in different cultures. In some places, it’s a main way to communicate, while in others, people might spend more time interacting face-to-face. Technology access and cultural attitudes definitely impact how people use it.
Week 11 Journal Entry: Social Cybersecurity
In the article from Army University Press, the author explores the concept of social cybersecurity, which emphasizes the importance of human behavior, trust, and social dynamics in shaping cybersecurity strategies. A central argument is that while technological defenses remain crucial, the human element can’t be ignored cybersecurity is just as much about psychology and behavior as it is about hardware and software (Army University Press, 2019).
The article delves into how trust is a fundamental aspect of cybersecurity, suggesting that without the trust of employees, customers, and stakeholders, even the most advanced technical systems can be undermined. Social engineering, identity theft, and insider threats are all real risks that stem from an organization’s social dynamics, not just vulnerabilities in the technology itself (Army University Press, 2019). This calls for greater integration of social awareness and cultural considerations into cybersecurity practices. Organizations need to not only equip their teams with technical skills but also create a culture where cybersecurity is valued and supported by all members (Army University Press, 2019).
What struck me the most was the call for collaboration cybersecurity cannot be a siloed effort. By fostering a collective responsibility for cybersecurity and understanding how psychological factors such as trust influence decision-making, organizations can significantly enhance their resilience against cyber threats. Additionally, the piece raised an important point about the evolving role of social media in cybersecurity threats, especially in how disinformation and malicious social engineering tactics are used to exploit human weaknesses (Army University Press, 2019).
This article has made me to rethink the role of social dynamics in cybersecurity. It’s clear that, in the modern digital landscape, the battle against cyber threats isn’t only about technological prowess it’s about understanding and influencing human behavior within the context of security. Building a culture of security and trust is as important as building firewalls and encryption algorithms.
Week 11 Journal Entry 11: Social Themes in Cybersecurity
In the video on the role of a cybersecurity analyst, various social themes emerge, underscoring the significance of human interactions within cybersecurity. One key theme is collaboration, as analysts must often work cross-functionally with different teams to protect an organization’s digital infrastructure. The job isn’t purely technical it involves constant communication with non-technical personnel, showing how essential teamwork and social dynamics are in effectively addressing security threats (Sergi et al., 2023). Another prominent social theme is the human aspect of cybersecurity, particularly how social engineering attacks prey on human psychology, such as trust, fear, and curiosity. Analysts need to be aware of these psychological tactics to defend against malicious attempts to exploit vulnerabilities in human behavior. This aligns with broader trends in cybersecurity, where human error is often the weakest link in defense strategies (Army University Press, 2019). The emphasis on adaptability and continuous learning also reflects the evolving nature of social interactions in the cybersecurity field, where analysts must stay ahead of trends and constantly adjust their approach to security based on changing social behaviors and technologies.
Journal Entry 15: Reflections on Davin Teo’s Journey into Digital Forensics
After watching Davin Teo’s TEDx talk on digital forensics, I was really surprised by how much his career path ties into the social sciences. Teo actually started out in accounting, which is more about business, before moving into digital forensics, a job that mixes technical skills and understanding people.
What stuck with me most was how Teo explained the importance of social sciences in his work. He talked about how it’s not just about analyzing data, but also about figuring out human behavior, motivations, and social patterns to get to the truth. It made me think about how important things like critical thinking, empathy, and ethics are in this kind of work — not just knowing how to use the tech.
Teo’s journey shows that you can’t just be good at computers and expect to succeed. You need to understand people, too, like why they do certain things online and how that leaves a trail. Hearing him explain this really made me realize how valuable a background in the social sciences can be, even in a super technical field.
Overall, this talk really changed the way I see digital forensics. It’s not just about tech, it’s about people too and having skills from both sides is what makes someone really good at it.
Source:
Teo, D. (2018). Digital Forensics | Davin Teo | TEDxHongKongSalon. [YouTube Video]. https://www.youtube.com/watch?v=V6vpiWVU5i4