Journal 1
Of the NICE Framework I would want to focus my career on the Operate and Maintain category as well as the Protect and Defend category. Operate and Maintain includes specializations such as Technical or customer Support, system administration and System analysis. I am interested in all of these areas, also as it stands I have worked in customer support and that often involved some technical support as well. Technical and customer support typically involves helping someone through fixing an issue, such as how to fix a problem on a computer. I enjoyed being able to help others solve their problems, the gratitude expressed to me was one of the biggest rewards. System administration involves tasks such as installations, troubleshooting, and ensuring confidentiality, integrity, and availability. Systems analysis involves finding and implementing strategies to help an organization run smoothly. These are all vital roles within a given company that I would enjoy just as equally.
Nextly, within the Protect and Defend category there are two specializations I find to be especially intriguing. Those being cyber defense analysis and cyber defense infrastructure support. Being a cyber defense analyst entails identifying and analyzing flags within a system to ensure data is secure from threats. To work in cyber defense infrastructure support would include testing and implementing hardware and software necessary for managing a defense service provider. There are copious amounts of specializations to choose from in the NICE framework for cybersecurity. All roles are important and play a vital role to an organization however the specializations I have listed are the most interesting for what I aspire to have as a career.
Journal 2
There are various scientific principles, and they all can relate to cybersecurity. The first is relativism, this principle states that all things are related. This can be though of as a domino effect if there are twenty dominoes in a line and you push on toward another all dominoes in that line will be affected. The same can apply to events occurring within cybersecurity for example cybersecurity is a thing because of the evolution of technology which also led to the evolution of criminals becoming cybercriminals, leading to new and stricter cybersecurity. The second is objectivity, which includes using the facts and not allowing opinion to sway your judgement such as looking at the best ways to rehabilitate a cybercriminal. Parsimony means keeping explanations simple and easy to understand in the cyberworld there can be a lot of complex sounding terminology so this is something that makes it easy to understand. Ethical Neutrality means following a code of ethical standards during research, in terms of cybersecurity a person could learn various exploitable vulnerabilities within system to take advantage of, so having ethical neutrality is vital. The principle of determinism means that behavior is a direct reflection of events that happened in a past, this is a principle that could aid in explaining why it is that some cybercriminals commit their crimes.
Journal 3
A researcher might use the information on PrivacyRights.org to determine the types of areas breaches are more likely to occur as well as how many reported breaches there have been. The map on this site demonstrates each state and has a color ranging from a lighter to darker shade of red. This type of information could also help with information dealing with breaches as they relate to the population. Questions such as ‘’Are highly populated states more likely to have more breaches?’’ could be answered. This could also be a way to get answers to questions about demographics, some states may have more of another race or gender than others and one could attempt to use this information to determine if that affects the amount of breaches in an area.
Journal 4
Maslow’s hierarchy of needs includes self fulfillment needs, psychological needs, and basic needs. Most of these elements are relevant with the ways in which people use technology. The first need I mentioned self-fulfillment includes completing activities that help you reach your full potential and can be creative activities. An example of this in technology could be taking a digital media class, or a programming course. These are both creative activities that can help someone reach their full potential, such as becoming a video editor as you learn those types of skills in a digital media class. Psychological needs include feeling emotions such as love for those around you and having a sense of accomplishment. In terms of technology love can be displayed via various social media channels as there is typically where a lot of people can easily see updates and information about each other. Also, there are many ways to gain accomplishments through technology such as completing the courses I mentioned above. Lastly there are basic needs such as food or water and security. Security can be obtained via technology with things such as passwords or two factor authentication to secure online accounts. Basic needs such as food or water however, cannot be fulfilled through technology making it the only of Maslow’s hierarchy of needs that doesn’t apply to technology.
Journal 5
My rankings of the following Motives:
1.Multiple reasons-I feel as though most people will have multiple reasons to motivate them to do something. The article in info magazine also states that a cybercriminal will likely have various motivators as to why they will commit cybercrime.
2.For money-Money is a motivator for people to do most things such as work. In order to live comfortably money is a necessity. According to threat research of those who have been convicted of committing cybercrimes 50% spend the money on some form of an investment. Ranging from property to their “businesses” which in turn could help them to make even more money.
3.Politics- Politics are a determining factor for different areas depending on the level, city, state, or federal. The 2016 election where it was speculated that Russia rigged the voting in favor of a certain candidate, the motivations for an act such as this are immense. It could be to form an ally that would otherwise not be possible or another political reason.
4.Revenge- Revenge is a strong emotion and can stem from various avenues. A person may want revenge on a bully, on their ex spouse or on someone who the perpetrator feels as wronged them in general. The limitless amount of people or situations that could lead to someone wanting revenge on another makes it a strong motivator.
5.Recognition- There are some cybercriminals who thrive off of the attention they can get from performing attacks. The idea that they have done something that can impress the people around them, or garner the attention of many regardless of who it may affect negatively in the long run.
6.Boredom- The motivation of boredom creates an instance of bad actors committing cybercrimes simply based upon the fact they have nothing better to do. There are some who may not have had the opportunities to explore their talents to the fullest potential via a job or other outlet. Cybercriminals with this motivation will try things to see what they can, and simply just because they have nothing else they feel they can do instead.
7.Entertainment- There are some people with the skills to do great things but not have a strong moral compass or ethics. These people can use their skills purely for entertainment, there are some who do not get as much fulfillment from other activities such as biking, gaming, or watching television. There is also the amount of control one could have in certain situations to be able to create their own entertainment.
Journal 6
Journal 6
List three fake Websites and three fake websites. How can you tell that the fake websites are fake?
Three real websites
- ABC News Live – 24/7 live news stream
- Home for FBI Careers | FBIJOBS
- OP-CYBE190003 1..11 (silverchair.com)
Three fake websites
- https://aweczxapdf-de.netlify.app/00-tyler-beatty-2/9781107663152-cambridge-checkpoint-english-workbook-8-bk-8-ebook.pdf This website link redirects you to a completely different link from what it says it is. This is a scam site that has fake information and reviews all throughout.
- Beta.companieshouse.gov.uk :This is a website that was shut down and moved to a new domain. The website was for car sales, the shipping “company” that a consumer may try to use to get a vehicle shipped takes the money and provides no services.
- Abcnews.com.co :This website is made to look like the official website for abcnews, however in the official website there is no .co at the end of the link.
Journal 7
Create a meme explaining what is going on in the individual or individual’s mind and how it relates to Human Systems Integration.
This meme relates to colleges and and relate to peer networks. Peer networks relates to those we interact with, in this case it could be classmates, if this student needed help with completing their work. It could also be classmates that they are sharing the information of them attempting to finish their work before their class, essentially anyway that this individual might interact with their peers. This relates to college as the context of the meme is attempting to finish an assignment for morning classes which could be in a college setting.

Journal 8
In my opinion the media influences society to think that a lot of what happens in the cybersecurity world such as hacking is an easy and instant process. In many movies when someone is hacking they are usually seen typing really fast and doing things that don’t seem to have much intention. This makes it seem a bit oversimplified, which in the case of a movie makes sense but for viewers who do not know any better it makes it seem as skills such as hacking only includes a bunch of numbers being put together, instead of the complex process it is. I feel as though the media also makes it seem as though all systems will be the same or just as easy to break into. There will be a difference between trying to hack someone’s phone over Wi-Fi in a café than it would be to hack into a government server.
Journal 9
On the social media disorder scale I scored a 0, meaning I don’t have a dependency on social media, which I feel is accurate as I try to live in the moment and not on a screen. I think the items in the scale were very interesting, as I could picture myself as being in any of those situations nor could I imagine those around me doing actions such as skipping out on activities or arguing with others because of their social media usage. I think there are different patterns across the world because there will be a different set of standards for online usage and what is allowed. That is both within governments and the restrictions that may be in place due to the cultures of some places over others.
Journal 10
Write a summary or your response on the following article:https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/
I felt as though this article is very alarming and more people should be made aware of the current state of cybersecurity. I do not feel as though it is discussed enough about how much of a threat information can be, as well as countries participating in cyberwar fare. Having access to certain types of information can make some countries appear stronger then others as in that instance they have leverage to keep others in check. This can be the case even if one may not be aware of what type of information the other has, knowing that something damning could get out or be exposed leaves a certain amount of uneasiness. This in itself changes the way some wars an be conducted as all wars will no longer be the typical soldier marching into battle as most are used to but a digital war. This completely changes everything in terms of the types of strategies that can be used in war and the types of advantages one can have. This article also goes into some detail about how the evolution of technology has paved a new way for cybercriminals. There is also a quote from Fabio Rugge that states “Cyberspace is a powerful multiplier of the destabilizing effects of manipulated information.” meaning that there is no an easier access to information but it can be harmful when manipulated and presented to the media in a certain way. Technology has proved to be both a strength and a weakness and this article greatly details that.
Journal 11
Two different economic theories that relate to the sample breach letter are rational choice and Laissez-fare economic theory.
In the rational choice theory, a business makes the choice in their best interest, informing their members as opposed to them discovering it in a different way is a good way to maintain a good relationship with their consumers. The Laissez-fare economic theory suggest that the government does not intervene unless it is to protect certain rights. In this instance there was an investigation but it does not appear there is being any drastic action being taken against the company itself for the mishap.
Two different social sciences theories that relate to the letter are parsimony and objectivity.
Parsimony is the social theory that suggest that researchers should use simple language when presenting explanations. Objectivity relates to presenting facts and not allowing one’s own opinion to affect the information being given out. This letter is clear and to the point, it present the facts that are present and nothing more.
Journal 12
Of the list of 11 illegal things people unknowingly do online, the five I think are the most serious are faking your identity online, bullying, collecting information about children, sharing personal information such as passw2ords or addresses, and illegal searches on the internet.
Faking your identity is extremely deceptive and can have varying effects based upon how it is done. There are some who have engaged in acts such as catfishing using another identity as their own to communicate with others online, as well as people who utilize the identities of others in order to scam others.
Bullying is an atrocious act in any sense online or in person. Bullying is a senseless act and with technology it is easier to do and hide behind anonymity. Bullying can lead to a variety of mental health issues in the victims.
Collecting information about children violates the Children’s Online Protection Act and can be something very hard to get away from. Crimes of all kinds are seen as bad but those involving children as seen as even worst in some cases, so this can not only lead to jail time or some other form of punishment but a bad reputation as well.
The sharing of personal information can be harmful especially when doing so without their consent. Doing this can open doors to more issues if someone decides to pursue legal actions.
Illegal searches are also amongst the worst as there are some who feel as though deleting their history permanently erases it are wrong. There will always be records of what is put on the internet including searches. I do not condone any criminal behavior but at the very least I feel as though it shouldn’t be done on the internet.