Journal Entries

Journal Entry 1

When working in the cybersecurity field I would want to be as if I know what I can handle and understand the task that is based on me. Based on workforce roles I think these are better suited for me. Cybersecurity Curriculum Development and secure project management seem like two categories that appeal to me the most. With cybersecurity curriculum development you would base it off you would need the knowledge for the set of skills first then help others and also based on your knowledge to help them and so forward. With system project management would focus on protecting the project or what’s being worked on making sure there’s no risk of error as if there is one it could be cleaned up. Which appealed the least to me are cybersecurity instruction and privacy compliance. These two seemed like something that wouldn’t interest me then the others listed.

Journal Entry 2

Science and cybersecurity are related based on the knowledge used for it applies to its scientific field. With also using other useful forms of science to apply it to cybersecurity. Of the many ways science is used for cybersecurity is the use of understanding threats and vulnerabilities. To which you can try to predict its potential security issues, then to test the issue, and then get the results too refine the security issue that’s being cause of the problem to fix it. Like any other science cybersecurity involves testing and experimentation of the system at task. To which it is always being tested to ensure its effectiveness against attacks.

Journal Entry 3

Researchers can use this website to see the most recent and past data breaches to show where it went wrong and what was the cause for it to be a data breach. From the websites information the data breaches are mostly caused from weak security leading into access from the data breaches. To which some consumers demand for a stronger privacy protections in need for people to be exposed for the information to be released from the breaches. To fix the ongoing problem each year they analyze data for each data breach to fix the problem that many people around the world face from the data breach.

Journal Entry 4

With each level of hierarchy there is a comparison of how you can relate it to technology. Every person has a different consideration of how technology is important to the world that they would use it as a everyday need like food, air, and water. Technology is a key factor for your safety needs as it has bits and pieces of your personal life with different resources of all of them. As important technology is it can help connect with people all over the world including your friends and family with no matter where they are you can talk and connect with who you want and whoever you want. For most people who use technology they use it for freedom or a sense of recognition/status on public apps. With the many uses of technology it is an important factor in everyday life for most people who seek to use it for different reasons good or bad.

Journal Entry 5

Ranking the motive behind why people commit cybercrimes are for money, recognition, entertainment, multiple reasons, revenge, political, and for boredom. Ranking these explains the reasons why people do it, as for money it shows that hackers are willing to do anything for money as committing a cybercrime for a demand of a public offense. As described some go to the lengths for recognition so people can see how a problem starts and just for their own fulfillment. Just like recognition some people just want a challenge against them to further entertain them. With each motive it can be described in multiple reasons why someone would be doing the crime with each intent being a different motive behind them. As it can play out revenge can be a factor as to why someone would be doing the crime from a problem they suffered from a company or a person who hurt them in the past or so on. Political cybercrime is something that can be issued and ruled out to expose people of higher standing in the political field. As to why for boredom well many people who can hack can often find their self bored as it can lead to a similar motive like entertainment and wanting something to happen in their life.

Journal Entry 6

Website scams are not to be trusted with purchasing or putting in your private information can lead to exposing of your own self leading you to danger. These three websites shows why its not to be trusted for putting your information into.
-Example 1 – PiloLtd[.]com
PiloLtd[.]com is a website with little to no trust rate, it has a high rate of complaints from people who has purchased from it, and it also is poorly designed with no credibility of contact from the people who made the website.
– Example 2 – Omitages[.]com is a website also with a low trust rate with 1 out of 5, with numerous complaints of counterfeit products being sold on their website, and also has no form of contact online.
– Example 3 – Morrity[.]com is a website that is poorly designed with questionable products for sale. It also offers no contact information except a email address with no other way to contacting the source. Which can lead to purchasing from this website and not receiving what you paid for can lead to scam just like from the other websites.

From these counterfeit designed websites there are good examples of what a website is suppose to look like with a good source of people behind it not leading you to be scammed.
– Example 1 – Amazon[.]com is a website that has a reliable source for people online purchasing with also showing reviews on a product if whether you want to buy it or not. Also with good and a reliable customer service to back it up.
– Example 2 – Bestbuy[.]com is a website with good high end ratings with good credibility of customer service if you are in need of something which can be reliable for customers. Bestbuy[,]com also has a good source of contact information to be able to reach back on complaints and problems.
– Example 3 – Ebay[.]com is a good website for buying and selling items that may be old or new looking for profit. The website also has a buyer protection preventing scams from happening and it provides feedback from people who previously bought from the buyer to show if the person can be trusted or not.

Journal Entry 7

https://unsplash.com/photos/woman-in-white-button-up-shirt-holding-silver-iphone-6-R6dSBkz32B8

The person is having a laugh about a conversation on the phone.

https://unsplash.com/photos/man-sitting-on-concrete-brick-with-opened-laptop-on-his-lap-Z3ownETsdNQ

This shows person using a the computer while watching or editing with a view also.

https://unsplash.com/photos/brown-and-white-long-coated-small-dog-wearing-eyeglasses-on-black-laptop-computer-gySMaocSdqs

It’s unironically showing a dog using a laptop.

Journal Entry 8

I think the media influences the understanding by putting in different perspectives and concepts how complex it is by showing the different hacking attempts on how to get a base of what is happening to prevent it in the future or how to report it when working with it. In order for it is important to showcase how many different cyber threats are used and how many people fall into them everyday. With also educating people how important cybersecurity is perceived to protect people with a sense of coverage from the cyber threats that happen almost everyday to people with a rate of helping them to prevent it from happening in the future. 

Journal Entry 9

Out of the 9 questions on the social media disorder scale I scored 2 out of 9. The items on the scale all described people who use and see social media as something to use to get away or as a distraction from everyday life. With also describing how much time is wasted using social media. Also putting in cutting out hobbies for social media recognition. With describing all the reason that why people would use social media it can be said that people use social media for personal gain good or bad. That every person who use social media for the reasons described on the scale are using it for distractions often taking up much time without even knowing it from being on social media for such long of a time.

Journal Entry 10

The article proclaims how valuable social cybersecurity is and how it plays a big factor in our lives everyday but also the military force including the nation. It is a important function of national security with values that categorize what you do online including human behavior. From such deviant acts online can be a result of leaking your private information resulting into being a cyberattack. From different narratives of how important this is social cybersecurity is a big factor in todays society also being how it plays into many organizations dealing with organizations getting cyberattacks from disruptive people looking for money or other resources of why to hack into a company.

Journal Entry 11

From this video she explain how hard it is to score a cybersecurity job with also leading the benefits of what to do in order to prepare and get a cybersecurity job to outperform the rest. With also providing what companies are looking and providing for a cybersecurity analyst. She also describes how many companies looks for a cybersecurity analyst based on it is always beneficial to have one that can protect the company from a cyberattack. With many cyberattacks in the world it is always good for a analyst to help with dissolving the problem at hand being the matter of difficulty it is.

Journal Entry 12

To describe this sample breach you have to provide two different theories that relate to this concept. The first economic theory that relates to this is Marxian economic theory. This relates by the company reaching out to the individual of a data breach in which someone hacked them and has access of their card and other private information. The second economic theory that relate is Laissez-fare as it relates to reaching to the person who was a victim of the breach to get into contact with people to help their situation out and possibly recover the money and private information leaked. For social science theories it relates by the behavior of the act behind it to see after the data breach happened how the person that got hacked would be affected by it in a positive or negative way.

Journal entry 13

With this article it dictates that companies have dealt with hackings that have been difficult leading to the help of people who deals with it and seeing where they have messed up being the bug bounty policy. An example of companies being vulnerable is the Forbes Global 2000 lack vulnerability which can lead blind spots in the security structure of many companies which also can lead to financial problems in the future. With describing how the important bug bounty policy it helps companies to identify bugs and to be more aware of the situation since it could lead to many problems for future company opportunities.

Journal Entry 14

Everyday internet users do something that may be illegal and violate the code of conduct that should be used when om the internet. For there are reasons to be shared what violates the internet it is important to address them. One reason is using illegal searches on the internet is something that violates the internet by going on unforeseen websites might lead to you device getting hacked. Second reason is sharing passwords, address, or photos of others is not only a violation of privacy towards yours but someone else also, that being sharing passwords is very dangerous if you don’t trust a person. Third reason is bullying and trolling is something that can lead to many faults being that if the person your bullying is already having mental problems you bullying them can make them fell less about themselves may lead to something far more worse than you think. Fourth reason is faking your identify online is taking someone’s identity doesn’t know you and basically acting like your that person which if you do this people may think its them or doing something if someone else’s face they make think its the actual person doing what you are doing with their face behind the screen. The Fifth and final reason is using copyrighted images, doing this may lead to law financial problems that you may have to pay for a fine using a image without permission from the holder.

Journal Entry 15

Watching this video he described how digital forensics investigators plays into many categories including how collecting data and others research items can be used when being in this field. To a digital forensics investigator it includes having to gather information and other parts of evidence that may lead to further investigation with law enforcement. That being this field can include social science by including the grace of action that is to be put into place when collecting and gathering information. To which what is being examined in a psychological view point is to be expressed in a fit manor of the field of study your in either way is being examined is good or bad don’t let your emotions get involved.