Journal 1: Workforce Framework for Cybersecurity (NICE Framework)
The NICE Cybersecurity Workforce Framework serves as the cornerstone for developing the capacity and scale of the American cybersecurity workforce. It offers a conventional definition of cybersecurity as well as a thorough list of cybersecurity tasks together with the information, knowledge, and skills needed to understand and complete tasks. Under NICE there are Categories, Specialty Areas, and Work Roles. Under these components, there are functions, arears of work and detailed grouping of knowledge, skills, and abilities.
The Categories lists the seven high-level grouping of common cybersecurity functions, which is Analyze, Collect and Operate, Investigate, Operate and Maintain, Oversee and Govern, Protect and Defend, and Securely Provision. Under this list, there are specialty areas which includes the work roles. Choosing a career of interest from this list could be a challenge because they are all very intriguing. The arears that are most appealing is Cyber Defense Analysis and Cyber Investigations. While those two falls under different categories, they also have things in common.
Cyber Investigation examines cyberattacks and tries to stop cyberterrorists. They are capable of gathering and processing information that will be used in court, speaking with witnesses, figuring out whether certain cyber-incidents break any laws, testing already-existing security measures, and much more. A significant aspect of the job is staying one step ahead of criminals. Being able to contribute to the protection of people’s privacy brings a good feeling in this job. A job that keeps your mind active and keeps you on your toes may also provide a great deal of fulfillment, which everyone wants at the end of an investigation. Taking into
consideration, how much does Cyber Investigation make? The average annual salary for the United States job category of Cyber Investigation as of January 11, 2023, is $90,064 per year.
Cyber Defense Analysis protects information, information systems, and networks from threats by using protection skills and data gathered from several sources to recognize, evaluate, and report events that happen or may occur within the network. A cyber defense analysis defends a company from cyberthreats and actively creates rules for countering cyberattacks. Work roles under this specialty arear includes Cyber Defense Analyst, Computer Network Defense (CND) Analyst, Cybersecurity Analyst, Incident Analyst, Network Defense Technician, Network Security Engineer, Security Analyst, Security Operator, Sensor Analyst, Senior Network Security Engineer, and Focused Operations Security Analyst. A successful career in cybersecurity is possible with the right training and experience. Cyber Defense Analyst job can expect to make an average annual salary of $107,580 ($51.72 per hour), based on BLS data from 2020.
Securely Provision is the only category that is least interesting when it comes to the career I would like to focus on. Securely Provision develops secure information technology solutions, conceptualizes them, designs them, purchases them, and builds them. They are also responsible for certain network-related tasks. The specialty areas include Risk Management, Software Development, System Architecture, System Development, System Planning, Technology R&D and Test and Evaluation. Even though these are well paying jobs, it focuses more on coding, networking, and monitoring information, which doesn’t have my best interest. These jobs demand to refresh current skills or up-skill to new technologies more often than other
categories on the list. This could make these types of jobs overwhelming. Also programming and coding can get tedious.
References
Cyber Investigation Salary ($90,064) ZipRecruiter. https://www.ziprecruiter.com/Salaries/Cyber-Investigation-Salary.
“How Much Does a Cyber Security Analyst Make?” Herzing University, 12 Jan. 2023, https://www.herzing.edu/salary/cyber-security-analyst.
Moore, Michelle, and Read Full Bio. “How to Become a Cybercrime Investigator [+ Salary & Career Guide].” University of San Diego Online Degrees, 19 Apr. 2022, https://onlinedegrees.sandiego.edu/cyber-crime-investigator-career/.
“Workforce Framework for Cybersecurity (NICE Framework).” National Initiative for Cybersecurity Careers and Studies, https://niccs.cisa.gov/workforce-development/nice- framework#body.
.
Journal 2: How The Principles of Sciences relate to cybersecurity
Securing data, networks, programs, and personal information against unapproved or uncontrolled access, theft, or change is referred to as Cybersecurity. Due to many security concerns and cyberattacks, cybersecurity is very important now. Cyber security is a practical science when it comes to the STEM field. This means that experts in the field frequently apply established knowledge and recent scientific findings to produce practical applications, commonly in the form of technology. There are main goals to achieve while implementing cybersecurity, confidential information must be kept out of the reach of possible cyber attackers and other unauthorized individuals. Also, cybersecurity precautions must not obstruct authorized users from accessing information. The principles are, Determinism, Relativism Objectivity, Parsimony, Skepticism and Ethical Naturality.
In a scenario where a person takes a particular action or makes a particular decision, determinism states that it is impossible for that person to have taken another course of action or made another decision other than what was done in the situation or scenario. In the past, we would wait until we were positive that an attack had occurred before taking any more action or making a decision about how to handle the matter. That’s how determinism and cybersecurity had relations.
In Relativism, everything is interconnected; technology influences changes in social systems, and present social systems influence technology. These are a handful of the
systems that are most closely related to cybersecurity. Relativism pushes us to acknowledge that modifications to any of these systems result in modifications to cybersecurity. Healthcare
Systems, Social System, Educational System, Critical Infrastructure System, Technological System and Political Systems are affected by the slightest change in technology and cybersecurity.
The term Objectivity describes how scientists value-free research on various topics. Assessments of cybersecurity can directly benefit from the Objectivity principle. This commonly adopted framework helps organizations achieve their goals by providing an organized, disciplined technique for evaluating and increasing the effectiveness of the control, risk management, and administrative processes.
The concept of parsimony appears to be widely used in the social sciences because it enables researchers to create clear ideas that can be applied to specific circumstances, allows them to isolate and discuss variables, and makes the theory in question more accessible to
the public. For privacy theorists, the challenge has been the complexity of privacy issues combined with a need for simplicity. It has been and still is a nightmare to define what privacy genuinely means because practically every definition has some limitations. Entering online or digital environments, where it is extremely difficult to develop a thorough understanding of how data flows across systems, what technical language requirements underlie data processing systems, and how to develop a comprehensive account of confidentiality and trust, only makes this problem worse.
We are encouraged to trust those around us in life, but when it comes to cybersecurity, we need to be more skeptical. Therefore, the Skepticism Principle is important. Cybercriminals take advantage of our innate tendency to trust. Employees in the cybersecurity field are skeptical of everything they do online. Cybersecurity focuses on common tricks that bad actors
use to get personal information breaches, including clicking on links and downloading files, replying to emails, and transferring sensitive data.
The term “Ethical neutrality” describes the standards to which researchers must follow when dealing with their subjects. There are multiple ways the ethical neutrality relates to cybersecurity, especially in cybercrime. This involves being willing to experimentally and objectively research subjects as well as upholding the rights of the people we investigate.
.
Journal 3: How Might Researchers Use Privacy Right Website Information to Study Breaches.
The website PrivacyRights.org , would be a useful source for researchers. A good website has good navigation and organization, good graphical representation, content utility, purpose, simplicity, and readability. From the listed qualities, this website seems to have all that. The website also includes a spreadsheet information about previous data breaches, including the date the breach happened, the date it was made public, the city and company to which it happened, the number of records that were compromised, and a description of the incident. Just this could provide a good information for a researcher studying breaches. But there is more information, like Law overviews which provides a comprehensive summary of state laws on the reporting of data breaches and the protections that apply to citizens of each state, Reports, Advocacy, Data Breach Chronology, and Data Brokers Database. All these will give a researcher a good understanding while studying breaches.
.
Journal 4: Maslow’s Hierarchy
A five-tiered model of human wants, frequently shown as hierarchical tiers within a pyramid, makes up Maslow’s hierarchy of needs, a motivational theory in psychology. The needs are physiological (food and clothes), safety (work security), love and belonging needs (friendship), esteem needs, and self-actualization. Looking at Maslow’s hierarchy of demands considering how advanced technologies has altered our interaction with these basic needs is interesting.
With the first tier ranging from bottom to top, Physiological needs are the necessities for a person’s physical survival. Food, water, clothing, and health are a few examples. Your body cannot operate normally if you don’t meet these demands. An example for how it. Relates to technology is, the needs are being bought online with our personal devices. Ordering clothes, food clothing and others are how this level of need relates to technology in or daily life. It has made life easier.
There are many pros with technology when it comes to safety need. There is expanded security and enhanced communication. On some of our personal devices, we have GPS trackers and are often able to share locations with a trusted person, which, by doing this could make you feel secured and safe because you could get located and rescued when there is danger.
With love and belonging needs, technology plays a big role. Social media is a big platform for networking with peers. Creating bonds, finding love and new people to hang with. Online dating is one of the ways people connect with their loved ones. There are many apps for this.
Esteem needs includes self-esteem, achievement, mastery, independence, status, dominance, prestige, managerial responsibility. Students can reach an audience that past generations were unable to do so by using technology and the internet as a platform for publication. Students are required to present their knowledge, abilities, and comprehension in front of the instructor. The student is sometimes left feeling incredibly disappointed. By using blogs posts, they get noticed and appreciated which boosts self-esteem.
People have an intense need for connection, mastery, self-creation, and sharing. The most effective approach to support, encourage, and empower these things is through technology. There are numerous influencers who post content on social media sites like Facebook, Instagram, Twitter, and TikTok about activities like working out at the gym, dining out, showing off their vehicles and other possessions, and teaching people about different types of careers. Self- actualization might result from this. People will become inspired to take initiatives for both themselves and the neighborhood.
.
Journal Entry #5
Individual motives
Revenge will be put in first place. Retaliation in the form of seeking out conflicts with people who are antagonistic toward you because you want to exact revenge on someone you believe caused you harm or suffering and it happens more on the internet. This is mostly the main reason for cybercrime activities.
Money will be in second place. Cybercriminals commit crimes due to financial instability according to the articles. To help themselves out or support the life their living, they commit crimes like scamming.
People want acknowledgement for their action. Most people want validation or acceptance by society, which is one reason why cybercrime takes place, therefore, I’ll put Recognition in third place.
Political. This is ranked forth. Cybercriminals hack political systems because they’re inquisitive. They also do it because of their own political preferences.
Entertainment. People have fun in hacking people’s social media account. People have fun writing codes and software because they’re adventurous. These actions could be negative or positive towards others.
Multiple Reasons. There are some major reasons why cybercrimes happen. In the article for multiple reasons, together with social and psychological causes, any bad actors in the cyber world are also pushed by their own egos to lead lives of digital crime.
Last ranked is boredom. According to the first significant study on the topic, boredom is a major contributing factor in many instances of cyberbullying and trolling on social media platforms.
.
Journal entry #6
www.thebeaverton.com is the first fake website that was spotted. The domain had a lot of mistakes. The were words spelt incorrect in the domain name. There was no privacy policy, and the website was not secured, the web browser kept blocking the useage of the particular website. On the real account which is www.capitalone.com , the was a privacy policy and the was no blockage since the was website is secured.
The second website, which is www.theonion.com , there were a lot of advertisement links and pictures, which made it harder to get to the actual information on the website. The were random pop ups that had nothing to do with what’s on the website. The real website, which is www.odu.com has accurate and up to date informaion which is what a real website is supposed to have. There are no random pop ups, and the website runs smoothly.
www.theburrralstreetjournal.com was the last one. This website was found in my email with a strange domain. When ii clicked it, it had deals that were too good to be true. I tried checking out an item and it opened another website that was asking for personal information like my ssn , which you don’t need to buy an item on a website.
www.amazon.com was a real account that I used to compare in spot how fake the other website was. This website a secured checkout, double verification and payment of items was smooth.
.
Journal Entry #8
Social media users frequently share their private information, which might result in privacy violations. Malware can be distributed through social media platforms, which can cause computers to run slowly, bombard users with adverts, and steal confidential information. In some cases, it can also result in the loss of personal data or encourage hackers to utilize that data for illegal purposes. As a result of the public display of user posts on numerous social media platforms, hackers can passively gather data without a user’s knowledge. Some Hackers will go farther to obtain user information by getting in touch with the targeted people. From the video’s, it shows that hacker don’t break in, they login because they get information from targets. From the prints they may leave on the internet. The video shows how quick hackers get information from social media platform and used it against vic:ms before they could be blacked from doing that. The video shows how hackers and the media influences cybersecurity positively and negatively. Information gotten from the media can be used to retrieve personal information, which is negative. The information provided by the media can be used for protection or be a guide, which is the positive side of how it’s influenced by cybersecurity.
Journal Entry 9: Social System Disorder
I got 2.0 on the survey for social media disorder. I think the items in the scale is very important questions that will help diagnose social media disorder. It is important to note that not everyone who uses social media excessively will develop a disorder or experience negative consequences. However, this survey can help determine if a person has a disorder and if they do, try to help with either therapy or anything that could reduce it. Values, beliefs, and social conventions vary between cultures, and these differences can have an impact on behavior patterns on social media and the effects it will have on people. Different environments can influence behavior patterns. So there will be different use of social media in every part in the word..
.
Journal Entry #10
The importance of social cyber security, which encompasses defending data and systems against social engineering assaults like phishing and social media manipulation, is the main discussion in this article. The author focuses on how vulnerable people and organizations are to these types of attacks and the importance of raising public awareness and providing more information on social cyber security.
The author emphasizes several crucial ideas for social cyber security, such as continuous training, creating a security culture and incorporating security into regular activities. To stop social engineering attacks, the article also underlines the necessity of cooperation and communication between individuals and organizations.
In conclusion, the article offers insightful information on the changing cyber security threat landscape and emphasizes the significance of social cyber security in defending both individuals and organizations against social engineering attacks. It serves as a reminder that, despite the importance of technological solutions, effective cyber security requires a people-centric strategy that places a high value on collaboration, education, and awareness.
.
Journal Entry #11
The work description for a cybersecurity analyst is discussed in the video in relation to social behaviors. The position calls for a person to be analytical and detail-oriented, highlighting the significance of accuracy and precision in the field of cybersecurity.
To secure the organization’s security, cybersecurity analysts must collaborate with numerous departments and people, which calls for good communication skills. This focus on communication and emphasizes the value of cooperation and teamwork in the workplace. The video also emphasizes the importance of flexibility since people must be flexible and able to adapt to new circumstances as the cybersecurity landscape is continuously changing. This adaptability theme shows the value of resilience and the capacity to deal with change. In all, the video emphasizes the value of social and emotional competencies including collaboration, flexibility, and communication in the role of a cybersecurity analyst.
.
Journal #13
Andriy Slynchuk has identified eleven possible unlawful activities that internet users may be engaging in. The distribution of child pornography, online harassment and cyberbullying, copyright infringement, online fraud and identity theft, and the use of the internet to aid illicit operations such as drug and people trafficking are among the most significant breaches. These crimes can have serious consequences for victims and society. Child pornography possession, distribution, or manufacture is illegal and penalized by law. Cyberbullying and online harassment can have profound emotional and psychological consequences for victims. Copyright infringement robs content providers of monetary remuneration for their efforts. Online fraud and identity theft include the theft of personal information and can result in financial loss. The use of the internet to support criminal operations has worldwide implications and can have terrible repercussions. Internet users must understand the repercussions of their conduct and accept responsibility for adhering to the law. To prevent these major acts, it is critical to promote online safety and security.
.
Journal #14
Why do you think women are less likely to enter cybersecurity careers? How can we better understand cybersecurity by exploring the topic through a gender or racial lens?
Women’s underrepresenta/on in cybersecurity is a complex topic with many elements at play. One key problem is the industry’s dearth of female mentors and role models, which can make it difficult for women to envisage themselves in cybersecurity posi/ons. This sensa/on of solitude can be especially depressing for women who already feel like outsiders in a male-dominated sector. Popular culture frequently reinforces the percep/on that cybersecurity is a male- dominated subject, which can create an in/mida/ng and unwelcoming environment for women. This can make it more difficult for women to feel confident and comfortable pursuing cybersecurity employment. Another factor contribu/ng to the absence of women in cybersecurity is the percep/on that women lack technical ap/tude or interest. Even if women have the necessary abili/es and cer/fica/ons, this preconcep/on could discourage them from searching for employment in this profession. Gender and racial prejudices can have an impact on the development, implementa/on, and use of technology, including cybersecurity. Being bias can jeopardize privacy and security, and certain rules and prac/ces may dispropor/onately harm specific groups, such as women. To close the gender gap in cybersecurity, addi/onal mentorship, networking opportuni/es, and educa/on should be made available to inspire and empower women to pursue employment in this industry. We must also fight assump/ons and biases, as well as guarantee that cybersecurity policies and procedures are inclusive and equitable for all people, regardless of gender or ethnicity.
.
Journal #15
Have social scien,sts improved our understanding of cybersecurity at the na,onal level? Explain
Social scien,sts have made significant contribu,ons to our understanding of na,onal cybersecurity by researching diverse human and social elements that affect security. These aspects include organiza,onal behavior, public policy, cultural and social impacts, psychological and behavioral characteris,cs, and economic incen,ves. They also inves,gated the impact of interna,onal rela,ons and legisla,ve frameworks on cybersecurity. Also, social scien,sts have contributed to the development of cybersecurity educa,on and awareness ini,a,ves, risk management frameworks, and decision-making models. Their study has contributed to a beFer understanding of the complex and varied nature of na,onal cybersecurity, as well as informed policy and prac,ce.