Journals Contd.

Journal #6

Prompt: Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source]. Compare the three fake websites to three real websites and highlight the features that identify them as fraudulent.

The first fake website is a website posing as Amazon. The difference between the realAmazon site and the fake “Amazon” site is the URL. The URL in the fake site has an “x”at the end of “amazon,” so it reads “amazonx.com.” This small difference can gounnoticed, causing someone to use this fake website.The other fake website has the same URL as the real website except it is missing the“secure” in hypertext transfer protocol. So the website says http instead of https, makingit less secure and likely to be fake/unreliable.Another fake website imitated a Honda Canadian site selling Honda lawnmowers for80%-90% off. The real website did not have discounts that low. If a website is sellingsomething for a suspiciously low price or at a price that seems too good to be true, it ismore than likely a fake.
 

Journal #7

Prompt: Review the following photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).

Image #1
In this image, a hacker is hacking into someone’s account, and they have retrieved the password but don’t realize it because the password is 8 asterisks, causing it to appear censored.
 
Image #2
In this image, the people are jumping for joy realizing they won’t fall for scam emails anymore.
 
Image #3
In this image, a guy is chilling because the hacker is struggling to launch an attack on him with his VPN.
 

Journal #8

Prompt: Write a journal entry about how you think the media influences our understanding about cybersecurity.

There are some aspects of cybersecurity in the media that are true, but I feel for themost part, how cybersecurity is presented to the public is not realistic. For example,because of the media, the term “hacker” has a negative connotation, causing people toonly think of hackers as criminals when there are ethical hackers as well, such as “whitehat hackers.” In the video, the lady also mentions how in these shows and movies, thecharacters are mainly using made-up terms, doing things incorrectly, or doing thingswith computers brought in for investigation that may be considered dangerous or notsmart. Some methods shown in media, such as “spear phishing” or games like “CTF,”are pretty realistic.

 

Journal #9

Prompt: Complete the Social Media Disorder scale Download Social Media Disorder scale How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?

I scored 1/9 on the social media disorder scale. I thought some of the items on the scalewere relatable and that the others were kind of crazy. I understand some people haveexperienced things such as arguing with family or friends because of their social mediausage, but it hasn’t been a thing for me, so I just thought that was a little crazy. I relatedwith some things like the persistence and displacement portions of the scale, but thescale asked if those things regularly happened and it is just a “here and there” thing forme; I do not regularly neglect other activities to use social media, etc.I think different patterns are found across the world because of the access to technologyand social media and because of different cultures. A country that does not usetechnology a lot generally will not relate to many things on this scale.

 

Journal #10

Prompt: Read this and write a journal entry summarizing your response to the article on social cybersecurity  https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/bLinks to an external site.

The article explains how social cybersecurity is an emerging domain that will affect thefuture of our warfare. Social cybersecurity focuses on human behavior and “hacking”humans, while traditional cybersecurity focuses on humans “hacking” technology. Overthe past few years, information has become decentralized, and now a lot oforganizations control the flow of information that is distributed to society. The articlementions how “it is imperative for leaders to understand social cybersecurity to defendinternal weaknesses against external manipulation.” Social cybersecurity is a vitaldiscipline for our future, and it is important that our military and society are educatedabout the decentralized modern information and the risks involved. Lastly, the articlementions that because social cybersecurity is multidisciplinary, “we must develop amultidisciplinary approach to cybersecurity.”