Entry #7

Review the following photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).

Many people have one password that they recycle across devices, which can be dangerous. If someone hacks into one thing, they’ll easily be able to go into another.

For many individuals, there is a strong culture around sharing passwords for streaming services. By not sharing your passwords, it allows you to protect the service that you are paying for, and to not have the risk of being signed out or taken advantage of. It is all easily preventable by keeping that information private. 

Many families have to rely on the same account for many things. Because of that, when one person unknowingly shares this password with a stranger, it can put the family at risk for a cyberattack. 

Entry #6

Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source]. Compare the three fake websites to three real websites and highlight the features that identify them as fraudulent.

Recently, there has been a toll payment text scam that has been going around. When you see the text, it has a website, and on the link, it has random numbers or letters at the end of it. Another thing to look for with a fake website is the domain, many have very full-looking links with different dots that aren’t making the domain .gov but instead something else. Many of these also have unusually surrounding texts, like making a bank payment on their website and using words like “now” to pressure their targets into worrying and not thinking. Real websites won’t have wording like this; most official websites also have warnings of this, saying that their company will never ask for routing numbers or other sensitive information over the phone. Real websites will also just contain .gov if they’re government-affiliated. These websites have proper spelling and aren’t replacing letters with numbers. 

https://its.uiowa.edu/services/phishing-and-anti-spam-efforts/understanding-website-names-what-three-letter-extensions

https://www.identityguard.com/news/how-to-tell-if-a-website-is-fake

Article Review #1: The Analysis of Cybercrime and Civil Protection


The Influence of Cybersecurity on a National Scale
This article looks at how Jordan’s sensitive information is vulnerable to cyberattacks.
The article takes an objective stance on Jordan’s attack and looks at the ways attackers
were able to access and leak their information. The paper is conducting its research by
gathering relevant cyber legislation throughout the world and comparing it to Jordan’s protective
measures against cybercrime, which have fallen short.
Masadeh comparatively looks into U.S. legislation, specifically the Computer Fraud and
Abuse Act and Electronic Communications Privacy Act. This act provides regulation of the sharing
and selling data. Jordan does contain several cybercrime-targeted policies, including the
Electronic Transactions Law of Jordan and Cybercrime Law of Jordan, which are very similar to
the U.S. laws that were discussed. Both acknowledge the misuse of cyberspace and state that
the misuse is a criminal offense (Masadeh, 2024). By looking at the nation’s legal defense, one
can observe the increasing growth of crime in cyberspace. This practice is determinism because
more people are getting away with transferring and collecting information, and more regulations
are coming out to counter it. Despite new laws, they aren’t covering enough guidelines, which
creates great vulnerability to their private information, especially across international levels
(Masadeh, 2024). In order to protect the sensitive information of Jordan, they must implement
more specific guides for prosecution of cybercrimes and increase enforcement by investing in
businesses in order to protect information and prevent leakage.
Conclusion
This study is important for looking at how big cyberspace and cybercrime are. It is
constantly growing, and the country’s laws will continue to grow as they know more about
cybercrime. This article demonstrates that despite the laws put in place, many of them aren’t
specific enough to tackle the wide range of cybercrime, and there is a great delay from
legislation and cyberspace.
Mansour Maghaireh, A. (2024, January 1). Civil Protection of Trade Secrets in
Cyberspace: Jordanian Legislation and International Agreements. International Journal
of Cyber Criminology.
https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/352/1
05

Entry #5

Review the articles linked with each individual motive in the presentation page or Slide #4.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it.

Money makes the most sense to me. Cash is required to support everyone’s living, you cannot do anything without money coming in. Political would be my second. Politics is about leveraging and making messages to interrupt legislation, and it makes sense to get the biggest message so more people are inclined to comply with the law. Motives fueled by revenge are ranked third for me because I understand the drive to make someone else pay for wronging you are someone close to you. Multiple reasons are my fourth because logically, it’s vague and covers many problems. Recognition is fifth, as people have a need for power to gain more. Entertainment is sixth and boredom is seventh; they provide no gain for the people doing.

Entry #4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology.

Maslow’s Hierarchy of Needs successfully demonstrates the layered levels of needs and fulfillment. The influence of technology on the basic need level has been communication. It is almost impossible to connect with the world without using technology, this communication being social media, messages, and the ability to call. Psychologically, technology has affected my behavior and my way of thinking. I’ve grown up with computer and television access, which has given me entertainment that allowed me to discover my likes and dislikes, satisfying my psychological needs. In terms of self-fulfillment, technology aids my growth in higher education. My college experience would be nothing without technology. My laptop allows me to work on my coursework and gives me additional resources so I can study for my classes.

Entry #3: How Public Information Help Researchers

Prompt: Visit PrivacyRights.orgLinks to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.

Given the information provided by PrivacyRights.org researchers may use their information to collect large-scale numbers that follow different types of breaches. Anyone who goes on their website can look at their continuously updating breach notifications, researchers can use this information to extend their safety features by knowing how many people are being affected by breaches, a chance to get ahead of attacks, and informing others through the extensive data collected by PrivacyRights.org. Advocating for the average consumer who may not be as aware of breach securities and their rights when it comes to their personal information. They provide support to the population by keeping updated information on new policies and tracking companies that are currently or have experienced security breaches.