Explain how the principles of science relate to cybersecurity
The principles of science such as relativism, objectivity, parsimony, empiricism, ethical neutrality, and determinism can all be related to cybersecurity through the social science lens. Relativism is the connection between all systems in cybersecurity, it denotes that any changes made will affect all systems. Objectivity is about not letting personal opinions influence how we address cybersecurity issues. Parsimony is about making our explanations of cybersecurity issues as simple as possible. Empiricism is not relying on opinions to understand cybersecurity. Ethical neutrality is what the name implies, remaining ethically neutral with addressing cybersecurity issues. Lastly, determinism is the principle that issues in cybersecurity are caused by events that took place in the past.
In what ways can researchers utilize the information on privacyrights.org to analyze data breaches?
Researchers can use the data from privacyrights.org to look for patterns or trends involving certain cyber-attacks. Tools like privacyrights.org make it possible to search for cyber-attacks of the past that have the same or similar characteristics as current cyber-attacks. This information can provide insight into future criminal activity by providing a history of how a similar attack in the past was orchestrated. This type of data can also be useful for analysts to determine if cybersecurity best practices are effective in combating against cyber-attacks. It can show trends that are gaining popularity and thus provide information of areas in cybersecurity that need attention.
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
My experiences with technology on a physiological level consist of the basic technological necessities. I have all the technology I need to perform the tasks that I want to accomplish. Some of these items include laptop, cell phone, tablet, internet connection. These technological essentials also go hand in hand with the needs of my family. My safety needs related to technology would consist of smart home technology, lights, locks, cameras, and fall detection for my elderly mother-in-law. Belongingness and love needs that technology provides for me would have to my use of communication devices, cell phone keep me in touch with loved ones. Esteem needs that technology provides for me would consist of the more luxury items, like heated and ventilated seats in my car, large televisions, multiple computer monitors. These things are not a necessity, but they make me feel good to own them. Self-actualization is not a level I have achieved; I would relate my full potential with technology as having a more efficient smart home and having a career in the cybersecurity field.
Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
- Multiple Reasons
- Money
- Political
- Recognition
- Revenge
- Entertainment
- Boredom
I ranked multiple reasons as number 1 because it incorporates all the main reasons why someone would cyber offend. Money is ranked number 2 because it is a necessity in life. Political reasons I ranked as number 3 because the popularity has grown with recent elections. Hacktivism is its catchy name, and more criminals are getting involved because they want change. Recognition is ranked number 4 because most hackers just want to show off what they can accomplish. Revenge is ranked number 5 just because I feel it is so awful, but I feel committing a crime because you want entertainment or you are bored is even worse.
How can you spot fake websites? Compare three fake websites (don’t access those sites, of course) to three real websites. What makes the fake websites fake?
When I think of fake websites, I think of E-commerce sites. The main reason to spoof a website is to get that credit card number.
- Real Apple.com fake applesupport.com
The fake site will give you a number to call for support of your apple product that is not associated with brand. When you call, you will be tricked into giving financial information. Pay attention to the web address.
2. Real Netflix.com fake multiple sites listed in email.
You will be sent a fake email from Netflix saying your payment was declined click here to fix payment method. When you click the link in the email you will be directed to a fake site. The sites intention is to steal your financial information. Pay attention to the web address.
3. Real chatgpt.com fake chat-gpt-for-windows.com
You will be prompted to download chatgpt software for your pc that will infect your pc with malware. Then they will still your financial data. Pay attention to the web address.
After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity
The media makes hacking look like a breeze, and that in turn makes people paranoid. Television shows make hacking look like anyone that has a computer and internet access can hack into the phone system and get your cell phone’s location in seconds. I personally like the movies where buildings schematics are accessed and elevators, cameras, and security systems are deactivated with a click of a button in mere seconds.
Social Media Disorder Scale
I scored a 1 on the social media disorder scale. I think that the scale will effectively diagnose social media disorder based on the questions it asks. I feel that there are several factors that would create different scoring patterns throughout the world. The digital divide would affect scale scores because of accessibility. Rural areas may have higher numbers compared to urban areas because there are less opportunities for entertainment. The age structure of an area also might influence social media patterns.
Social Cybersecurity: An Emerging National Security Requirement
Social platforms are the new way to receive news, but who is fact checking the latest news headlines that pop up on your device. Misinformation is a threat that is utilizing social media platforms for distribution and could be spreading harmful content. Social cybersecurity and national security are coordinating to produce solutions to mitigate the risk that harmful content creates. Misinformation in cyberspace according to Lt. Col. David M. Beskow and Kathleen M. Carley, can influence every aspect of every topic, and nations that enjoy freedom of speech are more vulnerable. This influence holds no bounds because of the nature of global social media platforms. An information maneuver is described as the manipulation of information and includes actions that influence discussion to benefit the wants of the creator. Misdirection, hashtag latching, smoke screening, and thread jacking are all ways to maneuver social media content. Social media may be the easiest and most convenient way to receive the news but be leery of the content you read. Make sure that you are doing your own fact checking, because if you choose to receive the news from social media then you are responsible for its validity.
How does cybersecurity analyst job relate to social behaviors. Social Themes that arise.
A cybersecurity analyst is a large umbrella that has many underlying duties, and these duties vary from company to company. If becoming a cybersecurity analyst many lucrative positions require experience, and this is an issue I am learning more and more about. If a cybersecurity analyst is an entry level position but one of the requirements for this position is experience, where do you get this experience? Internships and networking are going to be a good way to get your “foot in the door”. Do as much as you can to beef up your resume to give you “a leg up”, this is what potential employers are looking for.