{"id":210,"date":"2025-02-08T00:34:50","date_gmt":"2025-02-08T00:34:50","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/?page_id=210"},"modified":"2025-04-30T01:30:27","modified_gmt":"2025-04-30T01:30:27","slug":"cyse201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/cyse201s\/","title":{"rendered":"CYSE201S"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Journal Entry #1<\/h2>\n\n\n\n<p>I enjoyed reading about all the different areas of work in Cybersecurity. The areas that<br>interested me the most were Protection and Defense and Cyberspace Effects. I would like to<br>start my career aiming for the blue team. I appreciate the analytical and defensive side of<br>cyber. In Protection and Defense, I am specifically interested in Incident Response. I had not<br>read about Cyberspace Effects before, but I also felt intrigued by the work roles; specifically,<br>target network analysis. I like working on projects related to network analysis. Oversight and<br>Governance stood out to me the least. I am not a fan of any management roles, especially if<br>they involve training others.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #2<\/h2>\n\n\n\n<p class=\"has-text-align-left\"><strong>How the Principles of Science Relate to Cybersecurity<\/strong><br>Scientific principles are used in many different areas of cybersecurity. Empirical<br>observation leads to the understanding of cyber threats. With the knowledge and understanding<br>gained, the principle of determinism can be seen in cybersecurity. Determinism states that all<br>occurrences can be predicted in theory. With predictable behavior, cyber threats can be identified<br>and mitigated. After all, there is one predictable outcome of an insecure network. The principle<br>of relativism explains how things are not always right or wrong by default but by perspective.<br>Relativism can be seen in cyber when defining the gravity of a vulnerability threat or risk. There<br>is also no universal standard for every cyber situation. The principles of science relate to<br>cybersecurity in many ways and those were just to name a few.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #3<\/h2>\n\n\n\n<p>On the PrivacyRights(.)org website there is a lot of different types of information on breaches. There is a map of zones that have been most affected as well as graphs on what companies are targeted the most. There is also a section where you can see breach notifications from 2005. This includes breach type, total affected, the name of the organization, and the date. It is important for cyber researchers to study this information. They can use this information to see what kind of companies receive certain attacks. Pattern recognition is crucial to securing systems; this website has everything mapped out in a way where you can start to see patterns. They can also study different types of breaches in general.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #4<\/h2>\n\n\n\n<p>Maslow\u2019s Hierarchy of Needs demonstrates how humans fulfill needs based on a hierarchal order starting with the most basic needs, leading to more self-fulfilling needs. My digital experience began with an interest in technology such as computers and phones. The physiological needs were met by devices, knowledge of devices, and working WI-FI. Once I was interacting with technology, I had safety needs which were met by having secure passwords, being safe online, and never connecting to public networks. These two are considered basic needs. Belongingness and love needs were met when I started using technology to interact with friends on social media. My esteem needs were met by gaining a following on social media and having people interact positively with my posts. Self-actualization needs were met not only by having a surface- level digital experience but being aware and knowledgeable of how technology works behind the applications.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #5<\/h2>\n\n\n\n<p>As with any other form of crime, every individual has their motives. With the motives presented in the slide, I would rank them as political, money, entertainment, boredom, recognition, multiple reasons, and revenge. Although still very illegal, oftentimes hacktivists expose corruption, so the motive makes sense. A lot of people commit normal crimes for money. In the article we read, it said 15% of cybercriminals who do it for the money use it to pay bills. Entertainment being a motive for cybercrime is a little absurd but at the end of the day, they gained money out of it so maybe that was not the true motive to begin with. Boredom, recognition, and multiple reasons such as ego, is not a good motive because I don\u2019t think committing a crime or exposing yourself to a crime for either of those reasons makes sense. Lastly, the motive that makes the least sense is revenge, it hurts someone the most and there is truly no gain.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #6<\/h2>\n\n\n\n<p>There are many fake websites out there and it is good to be safe and learn how to detect them. The first thing one must look at when determining whether a website is fake or not, is the domain names. If we look at \u201cBankofAmerica-Login(.)site\u201d, we know that this can be sketchy because it is not widely used for organizations such as banks. Some banks even have a . BANK domain but most use .com. Recently there were fake websites that were made to look like PayPal\u2019s login page. \u201cPaypa1(.)com\u201d is very telling just by looking at it because of the URL. Lastly, there have been a lot ChatGPT impersonators. We can tell that \u201cchat-gpt-ai-pc.info\u201d is not legitimate because it has an overly complicated URL and a strange domain name.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #7<\/h2>\n\n\n\n<p>https:\/\/unsplash.com\/photos\/serious-caucasian-female-engineer-crouching-by-server-equipment- and-using-laptop-while-troubleshooting-problem-in-server-room-lit-by-red-light- WlLWgrT9Mpk<\/p>\n\n\n\n<p>\u201cWhen the security fatigue hits\u201d<br>The female engineer is staring blankly into her computer, and she is drained from trying to remember her randomized passwords to all her different accounts. This is relevant to human factors because people get security fatigue trying to keep up with all of the cybersecurity best practices.<\/p>\n\n\n\n<p><a href=\"https:\/\/unsplash.com\/photos\/group-of-people-doing-jump-shot-photography-FC4z3l4sUYc\">https:\/\/unsplash.com\/photos\/group-of-people-doing-jump-shot-photography-FC4z3l4sUYc<\/a><\/p>\n\n\n\n<p>\u201cWhen your organization finally creates a human factor program\u201d<br>The young men are jumping for joy because the company they work for now has a human factor program. Human factor programs can benefit both an organization\u2019s employees and company efficiency by combatting problems such as insider threats and employee burnout. This is something to celebrate!<\/p>\n\n\n\n<p>https:\/\/unsplash.com\/photos\/male-programmer-working-on-desktop-computer-with-many- monitors-at-office-in-software-develop-company-website-design-programming-and-coding- technologies-fxtpTGech0M<\/p>\n\n\n\n<p>\u201cMe after falling for the second phishing email this month\u201d<br>A young man is staring blankly at his screen in deep thought. This image and meme relate to human factor because, well, falling for a phishing email, is a human factor. Human factor programs can educate and help prevent these human errors through training.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #8<\/h2>\n\n\n\n<p>The film industry exaggerates everything for dramatic effect. Cybersecurity is no exception. They either ramify or oversimplify everything. For example, in the first scene played, there are 3D visuals of malicious code. This is shown in a lot of films\/shows. This is clearly for dramatization. In the example with Rihanna, they simplified the social engineering attack by making it seem that she could have gained access just by the user maneuvering his mouse on the email that she had strategically sent out. The media is not an accurate representation of how hacking works. It was nice to see the scene in the Matrix show tools such as Nmap as well as demonstrate an actual vulnerability. This was a more accurate representation!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #9<\/h2>\n\n\n\n<p>According to the Social Media Disorder Scale, I have risky social media usage. The items on the scale are pretty accurate to problems we can see even within our peers. I have friends that would have probably scored the same if not more than I did. The scale reminds me of behaviors that would also be present in an addict, such as having to lie to family members and using social media as a coping mechanism. There definitely are different patterns found across the world due to contrasting cultures. Even within our country, I know of a lot of people who simply do not even have time to be chronically online.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #10<\/h2>\n\n\n\n<p>The article \u201cSocial Cybersecurity: An Emerging National Security Requirement\u201d, explores the concept of social cybersecurity in national security. In this source, social cybersecurity is the study of cyber-related human behavior and societal outcomes as well as the development of the proper infrastructure to keep up with evolving cyber threats. Through technology, information is now being used to divide societies. It is no longer just a technological attack but a social and psychological attack, targeting societal weaknesses to influence ideas. As digital manipulation increases and changes the battlefield, it is important that through policy and the spread of awareness, the Department of Defense can counter the \u201cinformation blitzkrieg\u201d.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #11<\/h2>\n\n\n\n<p>The job description of a cybersecurity analyst relates to social behaviors in many ways. As a cybersecurity analyst, one works closely with a team in which communication and collaboration is essential. Since the role includes protecting sensitive data, an organization places a lot of trust in its analysts. It Is important to respect that trust. Basic ethics and dependability is needed for the job and it comes with a lot of responsibility. In an ever-changing environment, adaptability can take an analyst very far as well. Although it is a technical role, soft skills or behavioral skills are just as important as technical skills.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #12<\/h2>\n\n\n\n<p>The two economic theories relating to the sample breach letter are the New Growth Theory and the Behavioral Economics Theory. The New Growth Theory focuses on technological innovation and how it drives economic growth. The theory also acknowledges that economic growth is driven by human capital. By maintaining transparency with customers, they will maintain economic growth. Behavioral Economics theory focuses on human factors. The breach letter gives recommendations to those potentially affected by the breach. The most relevant psychological theories are the Cognitive Appraisal Theory and Social Contract Theory. Cognitive Appraisal Theory demonstrates how individuals react to stressful events. The Social Contract Theory focuses on the trust individuals put in organizations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #13<\/h2>\n\n\n\n<p>As technology advances so do the skills of hackers. This presents the need for ethical<\/p>\n\n\n\n<p>hackers who can stay one step ahead of the bad guys. Unfortunately, there is a shortage of people equipped to perform this role. From an economic standpoint, bug bounty makes sense. When hackers find and exploit vulnerabilities, organizations experience economical losses. It is wiser for a bug bounty program to find vulnerabilities than to have someone find them for free and exploit them, leading to a greater economic loss. The programs are also economically beneficial because it is less expensive than hiring a person to the department.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #14<\/h2>\n\n\n\n<p>There are a lot of illegal things people do that they deem not so bad. Some run red lights, some do not fully stop, and to get technical, some people stream movies illegally online! Out of the illegal activities mentioned, I believe the five worst ones are faking your identity, bullying, and trolling, using other people\u2019s internet networks, sharing private information of others, and recording a VoIP call without consent. Most illegal online activity puts you at risk, but these are things that harm others and put others at risk. For example, bullying as well as sharing others\u2019 private information, puts people\u2019s lives at risk, making it one of the worst online activities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry #15<\/h2>\n\n\n\n<p>Digital forensics and social science are intertwined because they bridge the gap in investigations. Through digital forensics, law enforcement can collect evidence from digital sources. Then, using the social sciences, they can build a strong case using the digital evidence gathered. Social science provides a framework that helps law enforcement and investigators understand the social dynamics of cybercriminals and their behavior. From accounting to IT, he was able to receive an opportunity to work in the first national digital forensics practice in Australia. As an accountant, he probably had great analytical skills, which most likely helped him succeed in his new career.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Article Review #1<\/h2>\n\n\n\n<p><strong>Article Review #1: The Correlation Between Cyberbullying Victimization and Cyberbullicide<br>Introduction<\/strong><br>The internet is a powerful tool that can be used in a right and a wrong way. It can do<br>more harm than good in the wrong hands. Although the internet has many positive benefits, it<br>also has its downsides. With the fast growth of the internet, comes the growth of cybercrime. A<br>prevalent example of this is cyberbullying. The scholarly article, Cyberbullying and<br>Cyberbullicide Ideation Among Jordanian College Students sheds light on the sad reality of how<br>Cyberbullying starts and how it has truly affected the Jordan youth.<br><strong>The Principles of the Social Sciences<\/strong><br>In this article, the authors heavily use the following social science principles: relativism,<br>determinism, objectivity, and empiricism. The authors researched the effects of cyberbullying on<br>the youth. Meaning their lives online are interconnected with their regular social lives. They<br>conducted this research using objectivity and fully relying on data analysis from data they<br>collected themselves; this goes together with empiricism. The result is an example of<br>determinism. Their conclusion proved their hypothesis that cyberbullying negatively affects the<br>emotional well-being of the youth and can lead to suicidal thoughts. These are human behavior<br>and outcomes that can be easily predicted.<br><strong>Research Hypothesis, Research Methods, and Data Analysis:<\/strong><\/p>\n\n\n\n<p>The authors drew their questions and hypotheses based on Robert Agnew\u2019s General<br>Strain Theory. This theory suggests that deviant behavior (cyberbullying) can be a coping<br>mechanism, and that online animosity enables it. For their research, they sampled 1000 youth<br>students. They also used the data collection method and surveyed students from different<br>colleges. The dependent measure was whether the students had felt cyberbullicide ideations.<br><strong>Relation with Presentations in Class<\/strong>:<\/p>\n\n\n\n<p> While reading the article, I specifically thought a lot about Module 4. Specifically slide<br>24 which is labeled \u201cThe Psychological Role of the Offender in Cybersecurity Incidents\u201d. In the<br>research, they also investigated the cyberbullies themselves and noticed there was a correlation<br>between youth who had experienced violence in their homes and youth who were the ones<br>performing the cyberbullying. There are biological factors that influence the likelihood of<br>cybercrime.<br><strong>Challenges, Concerns and Contribution of Marginalized Groups and the Contributions of the<br>Studies to Society:<\/strong><\/p>\n\n\n\n<p>As we have talked about in class as well, many youths are susceptible to these<br>cybercrimes because they are placed in these environments. There are immense concerns for the emotional well-being of the youth. As seen earlier, these victims can also become perpetrators due to trauma. The contribution that this study had are the suggestions that it made. The authors talked about how the adults involved should be more careful and vigilant to ensure a safer space for the youth to avoid these problems.<br><strong>Conclusion:<\/strong><br>After reading the article, it is important to note the principles of the social sciences.<br>Determinism shows that the actions of the cyber bullies have consequences. It is also important for the youth not to put themselves in a victimizing position. Their human behaviors not only<br>affect online but outside of it as well.<\/p>\n\n\n\n<p>WORKS CITED<br>Al-Badayneh, D. A.-B., Khelifa, M., &amp; Ben-Brik, A. (n.d.). Retrieved from<br>https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/329\/9<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Article Review #2<\/h2>\n\n\n\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p>Article Review #2: Importance of Human Digital Rights<\/p>\n\n\n\n<p>The growth of technology use comes with its implications. As technology grows, it becomes more a part of everyday life for humans. With the increased use, one of the main concerns throughout various platforms are privacy concerns. The constant use of technology whether it is for personal use or for work brings the need for digital human rights. As this is a rather recent issue faced, it is important that it be acknowledges and understood to properly protect and safeguard individuals\u2019 rights.<br><\/p>\n\n\n\n<p><strong>The Principles of Social Science:<\/strong><\/p>\n\n\n\n<p>During their research, the authors used determinism, skepticism, and ethical neutrality. Understanding that behavior is influenced by preceding events helps in understanding that with the growth of technology, rights can be violated, and laws must be made. Skepticism is represented because they do not simply accept privacy risks or concerns at face value instead, they are considering alternative ways of addressing concerns. Last but most importantly, they are coming into their research with ethical neutrality looking for the best outcome for human rights. <\/p>\n\n\n\n<p><strong>Research Hypothesis, Research Methods, and Data Analysis:<\/strong><\/p>\n\n\n\n<p>As mentioned in the article, their purpose for the research was to emphasize the importance of recognizing and understanding the need for digital rights. The question the sought to answer was what kind of digital rights individuals were after. To answer this question, they used multi-method research and analyzed already existing data such as legal documents. <\/p>\n\n\n\n<p><strong>Relation with Presentations in Class:<\/strong><\/p>\n\n\n\n<p>This article reminded me a lot of when we talked about victimization and human factors. Specifically, about victim precipitation. Often laws are made that can easily be prevented by humans. Even if the internet which 100% safe, which is known could never happen, humans can still be put at risk through fault of their own. Although laws should be put in place for digital privacy rights, it is also important that users read application guides and frameworks to better understand the data gathered and then determine whether it is in their best interest to use said application.<\/p>\n\n\n\n<p><strong>Challenges, Concerns and Contribution of Marginalized Groups and the Contribution of the Studies to Society and Conclusion:<\/strong><\/p>\n\n\n\n<p>Increased technology and increased security in technology can lead to violations of human digital rights. This research investigates ensuring these rights are not violated. It studies what people look for to feel more secure whilst using technology. Not only what people look for but how important it is to take seriously.<\/p>\n\n\n\n<p>Works Cited https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/318<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal Entry #1 I enjoyed reading about all the different areas of work in Cybersecurity. The areas thatinterested me the most were Protection and Defense and Cyberspace Effects. I would like tostart my career aiming for the blue team. I&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/katieaportfolio\/cyse201s\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30564,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/pages\/210"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/users\/30564"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/comments?post=210"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/pages\/210\/revisions"}],"predecessor-version":[{"id":248,"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/pages\/210\/revisions\/248"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/katieaportfolio\/wp-json\/wp\/v2\/media?parent=210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}