{"id":344,"date":"2025-04-29T23:26:42","date_gmt":"2025-04-29T23:26:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/michaelapayne\/?page_id=344"},"modified":"2025-04-30T02:11:49","modified_gmt":"2025-04-30T02:11:49","slug":"journals-contd","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/michaelapayne\/cyse-300\/journals-contd\/","title":{"rendered":"Journals Contd."},"content":{"rendered":"<h1 style=\"text-align: center\"><strong>Cybersecurity and the Social Sciences <\/strong><\/h1>\n<h3><strong>Journal #11<\/strong><\/h3>\n<p><strong>Prompt: Think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.<\/strong><\/p>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The description of the cybersecurity analyst job relates to social behaviors because of<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">what the job does. A cybersecurity analyst is one of the first-line defenses that protects<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">a network against cyber threats. A cybersecurity analyst also responds and points out<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">flaws in a company\u2019s security system. The presentation talks about how this job<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">provides training for user awareness, which is a social aspect of the job. Providing user<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">awareness helps people become less vulnerable to cyber threats. Social themes like<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">adaptation and trust are important for a cybersecurity analyst. If you can adapt to any<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">situation and build trust with your company, you will be a more efficient security analyst.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\">\u00a0<\/div>\n<\/div>\n<\/div>\n<h3 class=\"PDFAnnotationLayer-container\">Journal #12<\/h3>\n<p><strong>Prompt: Read this\u00a0<a class=\"external\" href=\"https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf<span class=\"external_link_icon\" role=\"presentation\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a> sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different psychological science theories relate to the letter.<\/strong><\/p>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I think the economic theories that relate to the data breach notification letter are the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Marxian economic theory and the classical economic theory. I think this letter relates to<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the Marxian theory because the letter explains how their third-party providers<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">experienced a data breach and how the customers information could have been stolen.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This is an example of people with power (in this case, individuals who are more<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">tech-savvy) exploiting those without power and attacking their vulnerabilities as<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">customers. This relates to the classical theory because cybercriminals act under the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">same logic of taking risks for potential financial gain.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This letter also relates to two psychological theories. The neutralization theory and the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">reinforcement sensitivity theory (RST). Regarding the neutralization theory, the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">individuals who caused the company\u2019s data breach could have thought what they were<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">doing was really not that bad as long as no one got hurt or injured. The RST relates to<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the letter because the individuals could have committed this crime because of their<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">impulsive nature and because they were interested in the reward (the customers\u2019<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">information).<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\">\u00a0<\/div>\n<\/div>\n<h3>Journal #13<\/h3>\n<p><strong>Prompt: Read this article <a class=\"external\" href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true<span class=\"external_link_icon\" role=\"presentation\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>\u00a0 and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.<\/strong><\/p>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I think bug bounty policies are a good way for companies to maintain good cyber<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">hygiene habits and a good way for vulnerabilities that may have been overlooked by the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">company to be exposed. I also think it is interesting that the article mentioned how<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">hackers are not very concerned about the price they are paid for bug bounties, which<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">gives small companies with a smaller budget the opportunity to still benefit from bug<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">bounty programs. When I read that, I noticed that most black hat hackers hack for<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">financial gain, but these white hat hackers doing bug bounties do not seem to care for<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">money as much as black hat hackers. The article also mentions how new bug bounty<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">programs do not get noticeably more or fewer reports than older ones, so companies<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">can still benefit even as more programs launch.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\">\u00a0<\/div>\n<\/div>\n<h3>Journal #14<\/h3>\n<p><strong>Prompt: <a class=\"external\" href=\"https:\/\/clario.co\/blog\/illegal-things-you-do-online\" target=\"_blank\" rel=\"noreferrer noopener\">Andriy\u00a0<span class=\"external_link_icon\" role=\"presentation\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a><a class=\"external\" href=\"https:\/\/clario.co\/blog\/illegal-things-you-do-online\" target=\"_blank\" rel=\"noreferrer noopener\">Slynchuk<span class=\"external_link_icon\" role=\"presentation\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a><a class=\"external\" href=\"https:\/\/clario.co\/blog\/illegal-things-you-do-online\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a0<span class=\"external_link_icon\" role=\"presentation\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.<\/strong><\/p>\n<div class=\"TextLayer-container\">\n<p><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Out of all of the 11 offenses mentioned, I believe these five are the most serious: using<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">unofficial streaming services, collecting information about children, illegal searches on<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the internet, using copyrighted images, and sharing passwords, addresses, or photos of<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">others.<\/span><\/p>\n<ol>\n<li><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Usage of unofficial streaming services:<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I believe using unofficial streaming<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">services is serious because you are watching stolen content for free, and the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">creators of the content are not getting paid when illegal websites are used. Also,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">your information could get stolen just like the content you\u2019re watching was.<\/span><\/li>\n<li><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Collection of information of children online:<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Collecting information about<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">children violates the Children\u2019s Online Protection Act, which is very serious and<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">can result in tens of thousands of dollars in fines.<\/span><\/li>\n<li><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Illegal internet searches:<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Illegal internet searches are serious because they<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">could eventually land you in jail.<\/span><\/li>\n<li><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Using copyrighted images:<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Using copyrighted images without permission or<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">paying is serious because this is copyright infringement, and this can result in<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">criminal penalties.<\/span><\/li>\n<li><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Sharing passwords, addresses, or photos of others:<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Participating in these<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">acts compromises the privacy of individuals and could put them in danger,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">whether that was your intention or not.<\/span><\/li>\n<\/ol>\n<h3>Journal #15<\/h3>\n<p><strong>Prompt: Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker\u2019s pathway to his career.<\/strong><\/p>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I think it is interesting how the speaker started in an accounting practice before going<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">into digital forensics. The speaker was not sure what digital forensics was at the time<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">when he got offered the position, but he thought it would be something good for him. It<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">is cool to see how his career has played out because he was not looking to be in digital<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">forensics; the opportunity came to him, and he was able to work at one of the first digital<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">forensic companies in Australia.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">A career as a digital forensic investigator is related to the social sciences because it<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">involves investigating crimes and social issues. The social science principles are used<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">by digital forensic investigators by allowing them to understand human behavior in<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">relation to the crimes and enhance investigations, to name a few.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\">\u00a0<\/div>\n<div class=\"endOfContent textLayer--absolute\">\u00a0<\/div>\n<\/div>\n<\/div>\n<\/div>\n<h2>\u00a0<\/h2>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"http:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2017\/11\/PHP-code-58d2d5803df78c51623a6ce2-1024x683.jpg\" alt=\"\" class=\"wp-image-81\" style=\"width:504px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2017\/11\/PHP-code-58d2d5803df78c51623a6ce2-1024x683.jpg 1024w, https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2017\/11\/PHP-code-58d2d5803df78c51623a6ce2-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2017\/11\/PHP-code-58d2d5803df78c51623a6ce2-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-content\/uploads\/sites\/38203\/2017\/11\/PHP-code-58d2d5803df78c51623a6ce2.jpg 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/michaelapayne\/cyse-300\/journals\/\">Back<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and the Social Sciences Journal #11 Prompt: Think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. The description of the cybersecurity analyst job relates to social behaviors because ofwhat the job does. A cybersecurity analyst is one of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/michaelapayne\/cyse-300\/journals-contd\/\">Read More<\/a><\/div>\n","protected":false},"author":30410,"featured_media":0,"parent":141,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/pages\/344"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/users\/30410"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/comments?post=344"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/pages\/344\/revisions"}],"predecessor-version":[{"id":383,"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/pages\/344\/revisions\/383"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/pages\/141"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/michaelapayne\/wp-json\/wp\/v2\/media?parent=344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}