Journal entry 1. Review the NICE workforce framework. Are there certain areas that would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
After reviewing the NICE workforce framework I can honestly say that engagement is always going to be something that I think is the most important. I say this because in what you do, the way you interact with your audience is the most important. Something that I think appeals to me the least is agility. When working in a field like cyber security I think that agility is something that should be second nature. You’re dealing with important information and in some cases people’s very identity. Anyone should be agile without having to be told to do so.
Journal entry 2. Explain how the principles of science relate to cybersecurity
The principles of science are what helps us to fight against cyber attacks and to keep our information safe. The science of cybersecurity studies the relations between structures and dynamics of different rules and tasks in the cybersecurity policy, along with supporting attributes. They protect things like our digital identities, footprints and of course keep our information safe. The principles make sure that what we share online to websites, stays on the websites.
Journal entry 3. Visit privacyrights.to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.
Researchers can use the information that is provided to better understand the reason and motive behind data breaches. This website shows us reports using the data breaches that are recorded. In the reports each state has data breach notifications that are then compared to each other. I feel like this gives researchers the chance to understand what exactly puts people at risk. This site helps to educate us how cyber crimes are committed. We can learn how to better protect the information that we put on the internet as well as helping researchers develop ways that professionals can aid in preventing cyber crimes and developing software to best cybercriminals.
Journal entry 4. Review Maslow’s hierarchy of needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
At the bottom of Maslow’s hierarchy of needs is physiological. This represents basic needs, in this part of the pyramid I can immediately think of online shopping. This is where I buy everyday necessities. The next up is safety, this is where I would think is the part that keeps information confidential and safe such as important documents. This is where I would have information related to my social security number, or files that would jeopardize my employment, or morality. Next on the pyramid is love, this consists of interpersonal relationships I would also esteem. For both of these needs I associate them strongly with digital messaging and social media. Whether it is to post about our achievements or talk to others. I kind of categorize these the same ways because of how often I use social media for both. The top of the pyramid is self-actualization. This is where our creativity, lack of prejudice and our problem solving skills. Within this particular instance I actually cannot think of a way that I can digitally relate. I say this because this is a branch that requires more hands on thinking for me. These are issues that I would specifically like to put for phone down for because I believe that they require more critical thinking.
Journal entry 5. Can we create three fake websites and three real websites and ask them to spot what makes them fake?
I think we can make sites and ask people to spot the differences in the sites. In a presentation from (McMath, Amber. “Real or Fake Website Quiz.” Im That Teacher, 19 July 2021) she does just that. She gives us a powerpoint of both fake and real websites to test her student and see if they can tell the difference between what makes them counterfeit and what makes them real
http://www.imthatteacher.com/real-or-fake-website-quiz/)
Journal entry 6. Can you spot three fake websites and compare them to three real websites, plus showcase what makes them fake?
I believe that I can spot fake websites because I order online a lot, the websites that I feel like I’ve had to question or double check often make mistakes in the logo, and print of the websites that they are trying to copy. There is usually a lot of room for question in terms of if the site is legit or not. If I feel like I have to double check too much or have too much uncertainty I just leave the site.
A fake shoe website never takes you to the official accredited site. Nike’s website is the same site that their instagram advertises. A fake Nike website takes you to an unknown URL.
Shein is a site that usually asks its user to download the app from the app store upon scrolling through the app. A fake shein site would tell its user that there are problems with the site that stem from their device. It would in turn ask you to fix this problem by downloading the “antivirus” that it usually advertises.
More fake sites that I notice have a lot of indicators that it’s a doppelganger are hair vendering sites. Hair vendering has become super popular in the present day hair industry. Since it’s so high in demand there are more and more sites. A lot of these sites use “exchange-like” services where in exchange for a good review, they ship free hair. It’s easy for these sites to look legit because they all share the same kinds of information. However, sites that ask for too much information like your bank account numbers and use excuses like “we don’t have….” are the ones that I know are not reliable or are being run by people who want the money.
Journal entry 7. After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.
Whether we realize it or not the media plays a really large role in the evolution of movies. The things that happen in them and how dramatized everything may be. When it comes to our understanding about cybersecurity I believe that movies try to make cybercrime seem edgy and as if it takes a lot of futuristic technology in order to achieve these crimes. I think in a way they glorify these crimes to make it seem “badass”. The media gives us the idea that hacking involves all of these holograms and images while using all this terminology to make it seem much more complicated than it is.
Journal entry 9 Complete the social media disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
I scored pretty high on the social media scale. I use social media a lot so I wasn’t surprised. That’s where I get some of my information whether it’s extracurricular or has anything to do with activities at school. I follow trends on social media and like to up to date on the things that I’m interested. Although I know that some people don’t use social media often, I find that my peers and I are always exchanging messages on social media. It’s super convenient, and circling back to the point in the beginning I definitely understand why I scored what I scored on the scale.
Journal entry 10 Write a paragraph describing social themes that arise in the presentation in the video.
I believe that the presentation did an amazing job in going into detail and highlighting many aspects of the job position. You can tell that there is definitely a lot of writing many certifications. Seeing how many connections and the depth of the resources that are available. Networking has been shown to be an important part of gaining knowledge and aiding in experience. After watching the presentation I loved learning about the requirements of job positions like this.