Entry #15

Digital Forensics | Davin Teo | TEDxHongKongSalon– YouTubeLinks to an external site. Watch this video and think about how the career of digital forensics investigators relates to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.

Integrity of data is secured is something the speaker reinforces through his speech, which aligns with the social science idea of collecting data to be objective and parsimonious. These are important factors to the field of forensics because they must be able to reference again and thus cannot be tampered with, along with being able to accurately rely on this information. Forensic science is associated with criminal cases, and so they must also understand human behavior to effectively analyze and protect people from future attacks. The way the speaker talks about how he got into his career was very interesting and sweet when he gives credit to his father, who placed him in the initial technology class. 

Entry #14

Andriy Links to an external site.SlynchukLinks to an external site. Links to an external site.has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

Some of the more serious violations described in this article include using illegal streaming services, as not only is the content stolen, but these websites are also not secure and can compromise your information. Password sharing is another very common practice that has good intentions, but is just unsafe for the owner. You don’t know how many people know your passwords, and because they have that information, those people can lock the owner of the account and can take their payment information along with that. With TikTok, people are blurring the lines of sarcasm and jokes with trolling and bullying. Those harmful comments are part of your digital footprint and will stay with you, so you should be mindful of what you say to others. Another trend is creating fake accounts to stalk people online. It is illegal to stalk and to use another’s information. This is harmful because it promotes fraud and harassment. The article also discusses collecting information from people under the age of 13, which can stem from these fake accounts. This puts children in danger, which is terrible. All of these involve some kind of fraud and putting someone in danger, which are serious offenses. 

Entry #12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different psychological sciences theories relate to the letter.

Laissez-faire economic theory explains that the government must intervene because there has been an interference in a company that has an individual’s information. Because this company has had a cyber threat, it is their duty to inform those who have interacted and explain that there is a situation. Reinforcement Sensitivity Theory suggests that people are motivated by the idea of reward. The reward in this scenario is access to people’s money through the taking of their credit card information. Marxian economic theory could also apply to this situation because someone who has greater cyber information was able to take advantage of the vulnerability within the targeted company’s software. Neutralization Theory would apply to the company because they are trying to make their customers aware of the threat and correct and acknowledge their wrong. 

Entry #13

 Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site.  and write a summary reaction to the use of the policies in your journal.  Focus primarily on the literature review and the discussion of the findings.

This article addresses the growing concerns of companies and their cyber vulnerabilities, especially in large companies. Seeing as the branch is relatively new, companies have taken some time to create proper protocols for their online security. This article has found that a good solution to giving companies exposure to their cyber vulnerability is by having bug bounties. By having bug bounties, it allows a way for many hackers to view the company’s programs and point out the bugs and potential safety weaknesses. This not only helps the companies but also the hackers because it allows the companies a chance to look at their work and help the job or freelance pool of more than capable workers. The resistance to this is a lack of testing and time. 

Entry #11

Watch this videoLinks to an external site..  As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0Links to an external site. Think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation.

Nicole Enesse describes an entry-level cybersecurity analyst position as part of the response system that oversees the status of the network, making sure operations are running smoothly and answering and aiding people if they have trouble. She goes on to provide disclaimers that, because this field is relatively new, the road map isn’t quite as precise. Many things rely on the resume, experience, and networking when it comes to landing an internship or a job. Utilize your resources around you to maximize your experience and work on your connections. At least for entry, it is crucial to be active in your space so that you allow yourself the most opportunities to you can grow, learn, and advance your background, so don’t overlook the social aspect of the cybersecurity work market.

Entry #10

Read this and write a journal entry summarizing your response to the article on social cybersecurity

 https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/bLinks to an external site.

I believe this article does a great job discussing the importance of cybersecurity in politics, which affects populations and their way of living tremendously. It would be ignorant to ignore the social factors that follow policymakers. Especially in times of war, recently, it has been on the news that American politicians have been having a group chat in which they talked about classified materials that contain concerning war and army plans for the Middle East. This is a recent example of the danger this article is talking about. How casually war plans are being talked about when the moment someone leaves their phone open, someone who is not in the conversation can now easily get hold of very sensitive and valuable information that has the potential to harm many citizens. With new technology should come new awareness, legislation, and practices to information is where it is intended. 

Entry #9

Complete the Social Media Disorder scale Download Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?

After taking and reviewing the Social Media Disorder Scale, my score was 5 yes and was under the label of “risky usage”. I believe the items on the scale address the essential signs of addictions and of someone having an emotional and physical attachment to another identity, especially the withdrawal, escape, and persistence questions. I think different cultures are a good explanation for different behavioral patterns towards technology and one’s attachment to it. Even different ages are going to have vastly different social media usage. Younger people are more likely to have problematic phone usage on this scale because many of that population has grown up with phones and social media as part of their upbringing.

Entry #8

After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.

The media influences and adds extra flair, such as over-the-top words and infographics, to add to the visuals of the piece and to hype up the importance of that scene, and to specifically feed the audience and keep their attention. Not everything about the scenes is wrong, but many of them take the methods, like someone overtaking a car, but then all of the cars start moving independently, to hype the person portraying the hacker to show off their intelligence, but in reality is completely impossible.  Even in the more realistic scenes, the hackers review that they still lack the time and patience it takes for systems to operate realistically. 

Entry #7

Review the following photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).

Many people have one password that they recycle across devices, which can be dangerous. If someone hacks into one thing, they’ll easily be able to go into another.

For many individuals, there is a strong culture around sharing passwords for streaming services. By not sharing your passwords, it allows you to protect the service that you are paying for, and to not have the risk of being signed out or taken advantage of. It is all easily preventable by keeping that information private. 

Many families have to rely on the same account for many things. Because of that, when one person unknowingly shares this password with a stranger, it can put the family at risk for a cyberattack. 

Entry #6

Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source]. Compare the three fake websites to three real websites and highlight the features that identify them as fraudulent.

Recently, there has been a toll payment text scam that has been going around. When you see the text, it has a website, and on the link, it has random numbers or letters at the end of it. Another thing to look for with a fake website is the domain, many have very full-looking links with different dots that aren’t making the domain .gov but instead something else. Many of these also have unusually surrounding texts, like making a bank payment on their website and using words like “now” to pressure their targets into worrying and not thinking. Real websites won’t have wording like this; most official websites also have warnings of this, saying that their company will never ask for routing numbers or other sensitive information over the phone. Real websites will also just contain .gov if they’re government-affiliated. These websites have proper spelling and aren’t replacing letters with numbers. 

https://its.uiowa.edu/services/phishing-and-anti-spam-efforts/understanding-website-names-what-three-letter-extensions

https://www.identityguard.com/news/how-to-tell-if-a-website-is-fake