Journal Entry 11

            The description of a cybersecurity analyst job relates to social behaviors in how and what type of work is done, with the work that can be most of the time always having fall back to having to work with people and having to help others as well. From dealing with others, to having people…

Journal Entry 10

The article draws attention to different aspect of cybersecurity starting with the information side of it, clarifying what information warfare is now and how it is now the “main” type of warfare that does occur, and that these wars are not declared but have already began. Information is the biggest strength of these for national…

Journal Entry 9

For the Social Media Disorder scale I scored a 1/9 based on what is provided from thenscale and their descriptions. For what they all pertain to I do feel like I have a very good selfdiscipline of being able to not constantly be on social media and need it as a part of my daily…

Journal Entry 8

The way the media influences our understanding of cybersecurity in that it portrays it as justhacking. In that most media that does include anything cyber related it is mostly just abouthacking, and a dramatization of the process of hacking. Most movies and shows that include ahacker shows a person going through the process of hacking…

Journal Entry 7

This meme relates to the Human systems integration framework by the need for proper system security education. This meme primarily focuses on the training of phishing links that may lead to a user’s information being stolen or their system being compromised. One place in particular that heavily focuses on this type of training on a…

Journal Entry 5

Ranking the motives from what makes the most sense to what makes the least, I started with “For money” being the one that made the most sense. Since what the motive is providing to these hackers who may participate in unethical hacking, is something they can do mostly anonymously and the money they make  from…