Journal Entries

Entry 1

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. https://niccs.cisa.gov/workforce-development/nice-framework

The work role category that caught my eye early on was the design and development category. They conduct research, designs, develops, and tests secure technology systems. To be more specific, the work role I liked the most was systems testing and evaluation. They’re responsible for planning and executing tests. I believe it would be a fun and amazing role to be in. The least work role category that I was the least interested in had to be the protection and defense category. That was my least favorite category because they all just seemed very dull. I like doing things that are very exciting and those roles did not seem like they were. 

Entry 2

Explain how the principles of science relate to cybersecurity.

The scientific method forms the foundation of cybersecurity. It begins with observation and identifying unusual network activity. This generates a hypothesis that the system may be under attack. To test this, cybersecurity professionals analyze logs and monitor traffic in a manner similar to a lab experiment. They want to know the attack vector, the attacker’s identity, and their objectives. This is similar to identifying variables and constants in an experiment. Data is collected and then analyzed to confirm or refute the hypothesis. If confirmed, a plan is implemented to mitigate the attack, similar to developing a theory. This plan is tested in a controlled environment prior to deployment. Following remediation, the system is continuously monitored for additional anomalies, reflecting the cyclical nature of the scientific method. 

Entry 3

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.

I think understanding the nature and depth of breaches in different sectors is achievable, with the help of the data breach information provided by PrivacyRights.org, which is publicly available. Such analysis can be done by considering the nature of the breaches (ex: hacking, insider, physical loss) the organizations facing the breaches (ex: healthcare, finance, education), and the extent of data disclosure. This information can be used for research on the various dimensions of breach containment including the multiple practices in place and their efficiency, as well as the costs and legal implications of the breaches. Guidelines from tort reforms, such as those on breach notification, can be evaluated in this manner. It contains important as well as reliable but limited information, and a small number of witness statements as people who are affected don’t necessarily comment on the web. Nevertheless, such data is a good place to start for those investigating the complex issue of data breaches.

Entry 4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

Maslow’s Hierarchy of Needs outlines human motivation, advancing from basic physiological needs to self-actualization. Reflecting on my technological experiences, I can see how they intersect at each level. Physiological needs, the pyramid’s base, are met through technology providing access to essential services like healthcare portals for medical support or online grocery shopping for nutrition. Safety needs are addressed by cybersecurity measures protecting personal data and devices, giving a sense of security in the digital world. Social media and video conferencing fulfill the needs of love and belonging, allowing for connection and community-building despite physical distance. Esteem needs are met when technology facilitates recognition, such as a well-received online presentation that boosts professional reputation. Self-actualization, the most important need, entails using technology to promote creativity and personal growth, such as digital art tools or online learning platforms that open up new skill opportunities. Ultimately, technology is a double-edged sword, with the potential to both support and hinder progress at each level of Maslow’s Hierarchy.

Entry 5

Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it.

1. For Money: Financial gain is an obvious, direct motivator. The article provides specific examples of how cybercriminals spend their illegal earnings, demonstrating that the idea of financial reward is a powerful motivator for this behavior.

2. Multiple reasons: Recognizing that individuals frequently have complex motivations is consistent with our understanding of human behavior. Cybercriminals, like others, may be motivated by a variety of factors such as financial need, a desire for recognition, or personal grievances.

3. Political: The desire to effect political change or express ideological beliefs is a strong motivator, particularly among the hacktivist community. These individuals see their actions as a way to challenge power structures and effect social change. 

4. Revenge: A need for revenge, which often originates from feelings of powerlessness or victimization, can be a powerful motivator. Cybercrime may be a way for individuals to regain control and respond to perceived wrongs. 

5. Recognition: The desire to be acknowledged and respected by one’s peers is a common human motivation. For some, demonstrating technical skill through cybercriminal activity may be a means of gaining recognition within specific communities.  

6. Entertainment: This motivation appears to be less compelling than others. It may be a contributing factor rather than the primary driver of behavior. 

7. Boredom: This motive ranks last because it appears to be the least substantial. It is unlikely to be the primary reason for illegal cyber activity. 

Entry 6

Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?

Note: Don’t generate/access or click on any unwanted/fake websites on your web browsers. Showcase with examples, what makes the fake websites fake.

The first comparison website would be ww.amazn.com compared to the real website of www.amazon.com. The second fake website would be www.paypa1.com compared to the real website which would be www.paypal.com.  The last phony website example would be www.yaho0.com compared to the real website which is www.yahoo.com.  The first website is fake because it’s trying to trick you by being very similar to the Amazon website. The key differences such as adding deals to the subdomain and the misspelling of Amazon. Legit companies usually don’t misspell their names or add extra words. The second example is trying to impersonate the PayPal website. This website is fake because the “l” in PayPal has been replaced with a 1.  The last example which is similar to the second example replaces the letter “o” with the number “0”. This is a common trick used by phishing sites. 

Entry 7

Explain how your memes relate to Human-centered cybersecurity.

Memes are meant to engage people in a relatable and entertaining manner, making complex cybersecurity concepts more understandable and memorable. They use humor references to vibe with people emotionally, making it more likely that info sticks and behaviors change. Memes, which put a human-centered spin on cybersecurity education, aim to provide individuals with the knowledge and motivation they need to protect themselves online.

Entry 8

After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity https://www.youtube.com/watch?app=desktop&v=6BqpU4V0Ypk

The media has a significant impact on our understanding of cybersecurity. Sensationalized stories about breaches and hacking instill fear and vulnerability. While raising awareness of threats is important, the emphasis on drama can make cybersecurity appear overwhelming and impossible for individuals to manage. The media frequently uses stereotypes and unrealistic portrayals of hackers as criminal masterminds, which can be misleading. These depictions lend a mystique to hacking that does not reflect the reality of this complex field. The 24-hour news cycle and social media can disseminate misinformation, making it difficult for the public to tell fact from fiction. This “noise” confuses people about which threats are actually relevant to their lives.

Entry 9

Complete the Social Media Disorder scaleLinks to an external site..  How did you score?  What do you think about the items in the scale?  Why do you think that different patterns are found across the world?

I took the Social Media Disorder Scale test and ended up answering yes to 5 out of the 9 questions that were given. I believe the 9 items on the scale end to be very much relatable to personal experiences and some of them also end up being words relatable to any kind of addict. I think the amount of technology we have today and all the functionalities we have using them can cause many people to be addicted to their phones, particularly social media. Most people attend to social media to find out new information they may need, any new news going on in this world, and some make a living through them. I believe different patterns for social media disorder may be found across the world due to the cultural and social factors that influence people on how to use and engage with social media. 

Entry 10

Read this and write a journal entry summarizing your response to the article on social cybersecurity https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/

Reading the article on social cybersecurity, I realized how important it has become to protect our social and digital spaces. Cybersecurity isn’t just about protecting personal data; it’s about defending against information warfare that targets beliefs, influences public opinion, and damages democracy. The analysis of case studies shows that disinformation campaigns are getting more sophisticated, using social networks to spread false information. The article also stresses that the military and government need to come up with new strategies to counter influence operations as new threats emerge. Educating the public and raising awareness about manipulative tactics sounds great to me. Considering how fast technology evolves, a comprehensive strategy that includes both technological defenses and public education is crucial. Overall, the article paints a vivid picture of the evolving cybersecurity landscape and stresses the need to take action. 

Entry 11

Think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation. https://www.youtube.com/watch?v=iYtmuHbhmS0

The first thing I noticed is that the location of where you may live can be very important. The salary for the job may be higher in another location which can likely cause people to relocate just for a higher salary.  Choosing the right pace of life with this job can be a big factor for people. Another social theme for this job would be the education one may have to achieve to be successful in this field. Another thing is gaining experience can be very valuable, especially if it’s early on. Lastly, being able to network and talk to candidates in that field. Networking could help you and your path to getting a job in that field much easier. 

Entry 12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

The first economic theory would be risk management. The letter talks about the company’s risk management strategies following the data breach. They worked with a cybersecurity firm to remove malware and continue to monitor their platform. This proactive approach aims to reduce future risks and protect customer information. The second economic theory would be a cost-benefit analysis. The company should weigh the costs of the breach like damage to its reputation against its benefits like maintaining customer trust. The letter’s content, such as the offered assistance and information on identity theft protection, suggests a desire to maximize benefits while minimizing costs. The first social sciences theory would be trust. The data breach violates the trust that was established between the company and its customers. The transparent disclosure of the shows a commitment to rebuilding trust with its customers. The second social sciences theory would be social identity. Customers may identify with the company and experience a sense of collective victimhood. The breach notification letter addresses this by providing resources and recommendations for preventing identity theft, acknowledging the common experience, and offering assistance.

Entry 13

Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site.  and write a summary reaction to the use of the policies in your journal.  Focus primarily on the literature review and the discussion of the findings.

The use of bug bounty policies as a crowdsourcing penetration testing technique is thoroughly evaluated in the literature in this article. It illustrates how these rules have become more and more well-liked as an inexpensive way for businesses to find vulnerabilities in their cyber infrastructure. Because companies only pay for successful finds rather than investing on internal testing teams, the authors note that bug bounty programs follow cost-benefit criteria. The literature analysis also examines the various factors, including program design, hacker incentives, and the legal frameworks around bug bounty schemes, that affect their effectiveness. The findings are discussed with an emphasis on the bug bounty policies’ economic rationale. Overall, the paper shows a balanced perspective on the use of bug bounty policies as a type of crowdsourced penetration testing, emphasizing both their merits and the challenges that must be handled.

Entry 14

Andriy Links to an external site.SlynchukLinks to an external site. Links to an external site.has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

The first and most serious violation is hacking and unauthorized system access. Gaining access to computers or networks without permission is a critical violation that leads to data theft or privacy breaches. This activity is severe because it disrupts individual, corporate, and even national security systems, making it highly consequential for victims and the wider community. The next serious violation would be downloading pirated content. I believe that it undermines industries and creators who depend on sales for their livelihoods, causing widespread economic harm. The third violation is cyberstalking and harassment. I just believe that this behavior can escalate into physical danger. The fourth violation would be using spyware without consent. It can lead to the misuse of sensitive data, including financial or personal details, and is prohibited under laws like the Wiretap Act in the U.S. The last violation would be phishing and social engineering attacks. They are serious because they exploit human trust and can lead to identity theft, financial loss, and emotional distress. 

Entry 15

Digital Forensics | Davin Teo | TEDxHongKongSalon– YouTubeLinks to an external site. Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.

Watching Davin Teo’s TEDx talk, I was struck by how his career in digital forensics is deeply connected to the social sciences. Davin’s path was fueled by curiosity, analytical thinking, and a desire to uncover the truth in the digital age. His work entails analyzing patterns in digital evidence, interpreting human behavior using technological footprints, and comprehending the societal consequences of cybercrime. This field combines psychology, criminology, and sociology because it requires an understanding of both the motivations behind criminal activity and the long-term consequences for individuals and communities. It’s inspiring how his work connects technology and humanity. His career pathway to his career was also inspiring.