Journals

In CYSE 201S, we complete journals to answer specific questions and reinforce our knowledge of what we learned in a particular module. 

Journal #1

Prompt: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

The work role category in cybersecurity that appeals to me the most is the design and development (DD) role. The overall scope of this work role category is developing, coding, and testing secure technology systems, which is what I would like to do because I am interested in a career that involves programming. The work role that appeals to me the most in the design and development category is the career of a secure software developer. 

The work role category I am least interested in is the oversight and governance (OG) category. I am interested in this area of expertise, but out of all the other categories, this one places last for me.

 

Journal #2

Prompt: Explain how the principles of science [Empiricism, Determinism, Parsimony, Objectivity, etc.] relate to cybersecurity.

The principles of science can relate to cybersecurity in many ways, ranging from morals to design. 

Starting with relativism, this can relate to cybersecurity because technological systems can lead to the development of improved technology or concepts. Many things in our society rely on technology or cybersecurity to function properly. Objectivity relates to cybersecurity because it helps scientists make crucial cyber-related decisions without bias. Parsimony can help keep the design of security systems simple, yet effective. 

Empiricism can emphasize relying on observable or physical data in cybersecurity. Ethical neutrality can come into play when scientists are studying cybercrimes but still protecting the rights of those involved in the case. Determinism in cybersecurity can help scientists understand why individuals commit certain cybercrimes. Lastly, with skepticism, scientists can consistently question certain data, cybersecurity policies, etc. 

 

Journal #3

Prompt: Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.

On the privacyrights.org website, statistics such as how many data breach notifications have been tracked and reviewed, how many individuals have been affected by data breaches, the different types of data breaches that have occurred, etc., are displayed. Researchers can use this information to study breaches by determining which breaches occur the most, where these breaches are likely to occur, how many individuals have been affected by these breaches, and more. The information this website provides can help researchers understand specific aspects of these data breaches, offering a useful way to study these crimes and potentially uncover the motive behind each breach.
 
 

Journal #4

Prompt: Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

  • Physiological needs: When I use food delivery apps to send food to my location
  •  Safety needs: Apps like Life360 allow for my family and friends to see mylocation, which can be especially useful for emergencies
  • Belongingness and love needs: Making friends online through video gamesand social media fulfills the need of belongingness digitally
  • Esteem needs: When I make the leaderboard in a video game or on an app onmy phone, I feel accomplished
  • Self-actualization needs: In 10th grade I made an app on code.org for a projectand I was happy and excited to show others the app
     
 

Journal #5

Prompt: Review the articles linked with each individual motive in the presentation page or Slide #4.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it.

  1. Boredom: A lot of individuals will commit cybercrimes because they are boredwith the usual digital interactions and want to try something new or they areintrigued by the idea of it
  2. Entertainment: There are many cases of individuals hacking for their ownentertainment in video games and more
  3. For money: Money scams are really common and money is a big motive forcybercrimes
  4. Recognition: People tend to want to be recognized and praised so this motivemakes sense when it comes to cybercrimes
  5. Revenge: If someone wants to get back at someone for what has been done tothem, that can be a strong drive for cybercrime
  6. Political: Some people are strongly driven by politics and will commitcybercrimes if they feel the need to “interfere” or “make a statement”
  7. Multiple reasons: Some people commit crimes for more than one particularreason for experimentation