CYSE 201S

Journal Entries

Click on where you need to be directed to.

Journal Entry #1

Journal Entry #2

Journal Entry #3

Journal Entry #4

Journal Entry #5

Journal Entry #6

Journal Entry #7

Journal Entry #8

Journal Entry #9

Article Review #1

Journal Entry #1

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

When reviewing the NICE Workforce Framework, I found several areas that align with my career interests and goals. While each area plays a crucial role in the cybersecurity field, some appeal more to me than others.

One of the areas that particularly appeals to me is “Incident Response and Analysis” within the “Protect and Defend” category. I am drawn to this area because it involves investigating security incidents, analyzing threats, and developing strategies to mitigate risks. I enjoy problem-solving and believe that working in incident response would allow me to use my analytical skills effectively.

Another area of interest to me is “Security Administration” in the “Operate and Maintain” category. I appreciate the importance of maintaining secure systems and networks. This role involves configuring security settings, monitoring for vulnerabilities, and ensuring that security protocols are up to date. I believe that a career in security administration would allow me to contribute to the ongoing security of an organization.

On the other hand, there are areas within the framework that appeal to me less. For example, “Software Development” within the “Securely Provision” category is an area I’m less inclined towards. While I understand the significance of secure software development, I find myself more interested in the operational and defensive aspects of cybersecurity rather than the development process.

Last, my review of the NICE Workforce Framework has helped me identify areas that align with my career interests, such as Incident Response and Security Administration. However, it has also highlighted areas that I am less enthusiastic about, such as Software Development. Ultimately, I plan to focus my career on roles that allow me to leverage my analytical and operational skills to protect and defend against cyber threats.

September 9, 2023, 5:00 PM EST

Journal Entry #2

Explain how the principles of science relate to cybersecurity.

Science concepts are critical to understanding and progressing in the realm of cybersecurity. Science is the foundation upon which we develop our cybersecurity plans, defenses, and reactions to the ever-changing world of cyber threats.

First and foremost, the scientific method is a crucial tool in cybersecurity. It encourages a systematic approach to problem-solving and threat analysis. For instance, when a security incident occurs, cybersecurity professionals apply the scientific method to gather data, form hypotheses about the attack, conduct experiments to validate those hypotheses, and draw conclusions. This methodical approach helps in understanding the nature of the attack and devising effective countermeasures.

Furthermore, mathematical, and cryptographic principles are inextricably linked to cybersecurity. To develop secure communication channels and preserve data, cryptography, in particular, depends on mathematical concepts. Understanding mathematical principles like as prime numbers and encryption methods is critical for building safe systems and maintaining sensitive information’s secrecy and integrity.

Also, the field of cybersecurity heavily relies on data science and machine learning. Data analysis is used to identify patterns and anomalies in network traffic, which can be indicative of potential security breaches. Machine learning algorithms are employed to develop predictive models that can detect and respond to threats in real-time. These scientific approaches enable us to proactively defend against cyberattacks and minimize the impact of security incidents.

September 9, 2023, 5:00 PM EST

Journal Entry #3

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.

I had a chance to explore PrivacyRights.org today, and it’s quite a fascinating resource for those interested in studying data breaches. This platform provides a wealth of publicly available data breach reports, offering key details such as the affected organizations, when the breach occurred, how many records were exposed, and the types of data that got compromised. It’s like a treasure trove for researchers delving into the realm of data breaches. With all this data at their fingertips, researchers can embark on various investigations. They can track trends and patterns in breach incidents over time, pinpoint those common vulnerabilities that consistently lead to breaches, and even identify which industries or sectors tend to be more vulnerable. What’s particularly useful is PrivacyRights.org’s regional breakdown of breaches, which can help researchers gain insights into regional cybersecurity disparities and potentially influence future security policies. To put it simply, PrivacyRights.org serves as an invaluable starting point for researchers looking to comprehend the ever-evolving landscape of data breaches and make contributions to enhancing data security practices.

September 11, 2023, 5:00 PM EST

Journal Entry #4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

Maslow’s Hierarchy of Needs, a foundational psychological theory, comprises five levels of human needs, each building upon the previous one. My experiences with technology resonate with this hierarchy in numerous ways. At the base, technology aids in fulfilling physiological needs through platforms like online grocery shopping, ensuring access to essential food and supplies. Additionally, it addresses safety needs through home security systems, financial apps, and telemedicine services, providing security, financial stability, and health support.

Moving up the hierarchy, technology enhances social connectivity, catering to love and belongingness, through social media and instant messaging platforms that foster friendships and maintain familial bonds. It also supports self-esteem by offering opportunities for skill development, self-expression, and recognition through online learning, social networks, and personal websites. Finally, technology aids in self-actualization by providing tools for personal growth and skill enhancement, allowing individuals to realize their full potential. In summary, technology has become integral to meeting these human needs, but balance remains crucial to ensure its positive impact on our overall well-being.

September 18, 2023, 5:00 PM EST

Journal Entry #5

Review the articles linked with each individual motive in the presentation page or Slide #3.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it.

I’ve taken a look at the articles associated with each motive and have ranked them from 1 to 7 based on what I believe makes the most sense to the least sense, and I’ll explain my reasons for each ranking.

For Money #1: This motive often makes the most sense as cybercriminals may be driven by financial gain, as demonstrated in the article about how cybercriminals spend their money. Money is a strong motivator for many illegal activities, including cybercrime.

Revenge #2: Revenge is a powerful motive, as seen in the article about revenge porn victims feeling let down by the law. Personal grievances can lead individuals to engage in cybercrimes to seek retribution.

Recognition #3: Seeking recognition or notoriety in the hacking community can be a motivating factor, as indicated in the article about Bradley Niblock’s election DDoS attack. Some hackers are driven by a desire for attention and recognition.

Political #4: Political motives can make sense, especially in hacktivism cases. The article about the new generation of youthful hackers joining hacktivism waves illustrates how political ideologies can drive cyberattacks.

Entertainment #5: Although less common, hacking for entertainment purposes can occur, as shown in the article about the man behind LinkedIn scraping. Some individuals may engage in cyber activities for fun or curiosity.

Boredom #6: While boredom can lead to cyberbullying and online sexual grooming, it’s often not the primary motive for engaging in cybercrimes. Boredom might be a contributing factor but is usually not the sole driver.

Multiple Reasons #7: This motive ranks the lowest because it encompasses a wide range of motivations, making it less specific. The article about what drives hackers to a life of cybercrime highlights that hackers may have a combination of motives, making it harder to categorize them into a single motive.

September 25, 2023, 5:00 PM EST

Journal Entry #6

Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?

Fake Website: https://www.morrity.com

Real Website: https://www.ebay.com

Fake Website: morrity.com vs. Real Website: ebay.com:

The first thing that caught my eye was the domain name morrity.com just doesn’t ring a bell like ebay.com does. Then, there’s the website design – morrity.com looks a bit amateurish compared to the sleek and professional design of eBay. Also, those too-good-to-be-true deals on morrity.com raise some eyebrows. Real websites don’t usually offer such unbelievable discounts. Contact information is crucial, but morrity.com doesn’t make it easy to get in touch.

Fake Website: https://piloltd.com

Real Website: https://us.shein.com

Fake Website: piloltd.com vs. Real Website: us.shein.com:

The domain name piloltd.com also seems somewhat obscure, while us.shein.com carries the name of a recognized brand. The design of piloltd.com appears less refined, and the product descriptions and images seem generic, a common red flag for fake sites. We need to be cautious when they ask for unconventional payment methods. Also, the lack of genuine customer reviews on the fake site, as opposed to Shein’s authentic feedback, is another concern.

Fake Website: https://hardaddy.com

Real Website: https://www.hollisterco.com

Fake Website: hardaddy.com vs. Real Website: hollisterco.com:

Firstly, hardaddy.com doesn’t seem remotely related to Hollister, and its website design falls far short of the professional appearance we typically associate with Hollister. To ensure a secure shopping experience, a thorough examination of shipping and return policies is imperative, as fake websites often omit these crucial details. hollisterco.com, on the other hand, offers comprehensive shipping and return policies that provide peace of mind. Finally, it’s worth noting that the quality of product images and the clarity of navigation shortcuts on hardaddy.com seem subpar, which can be a sign of a less reliable website.

October 13, 2023, 5:00 PM EST

Journal Entry #7

Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s).
https://unsplash.com/photos/mfB1B1s4sMc
https://unsplash.com/photos/gySMaocSdqs
https://unsplash.com/photos/ICTKcvnXx_8
https://unsplash.com/photos/Z3ownETsdNQ
https://unsplash.com/photos/5QgIuuBxKwM
https://unsplash.com/photos/R6dSBkz32B8
https://unsplash.com/photos/BXiLSwwvqrY
https://commons.wikimedia.org/wiki/File:Computer_user_icon.svg
https://commons.wikimedia.org/wiki/File:Summer_school_GLAM_giorno_1_1.jpg
https://commons.wikimedia.org/wiki/File:CellPhone_(16491636068).jpg
Explain how your memes relate to Human Systems Integration.

The meme I created, titled “When your poker face game is strong but your password isn’t” directly connects to Human Systems Integration (HSI). It humorously underscores the necessity of harmonizing user behavior with system requirements. This serves as a reminder of the crucial aspects of system design, such as user-friendliness, user education on security measures, and the provision of support for strong password creation. This connection highlights the paramount importance of considering the human element in system design.

October 15, 2023, 5:00 PM EST

Journal Entry #8

After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity

How do I think the media influences our understanding about cybersecurity

After watching the video it got me thinking about how the media influences our understanding of cybersecurity. It’s pretty wild how Hollywood portrays hackers and cybersecurity in such a sensational way, and I have a lot to say about it.

In these movies and TV shows, hackers are often depicted as genius individuals who can hack into anything with a few keystrokes. They make it look so cool, but in reality, hacking is way more complex, and it’s not something we should glamorize. Hacking can have serious legal consequences, and it’s usually not as flashy as the movies make it out to be.

What struck me is how cybersecurity professionals are portrayed as heroes who swoop in to save the day. While they do play a crucial role in protecting systems and data, their work is often about prevention and mitigation rather than dramatic resolutions. It’s essential to understand that cybersecurity isn’t all about fancy gadgets and dramatic moments.

Also, the media’s portrayal of technology can lead us to believe that hacking is easier than it really is, and that computer systems are more vulnerable than they are. This can inadvertently encourage people with bad intentions to experiment with hacking techniques, which is risky and potentially harmful.

To sum it up, the media has a big impact on how we see cybersecurity. It’s fun to watch these movies and shows, but we have to remember they don’t show the full picture. Real cybersecurity is more intricate and less glamorous. As viewers, we need to be critical and try to learn the real story behind hacking and cybersecurity.

It’s crucial for us to educate ourselves about the challenges of cybersecurity, the ethical concerns of hacking, and the hard work that cybersecurity professionals put in to protect our digital world. By doing that, we can develop a more accurate understanding of cybersecurity and separate fact from fiction in the media.

October 16, 2023, 5:00 PM EST

Journal Entry #9

Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?

I scored 1.0 on the Social Media Disorder Scale, which is below the threshold for a formal diagnosis of disordered social media use.

I found the items in the scale to be a useful way to evaluate my own social media usage patterns. They cover various aspects of social media use, such as preoccupation, tolerance, withdrawal, and more. This assessment helped me gain insights into my online behavior and its potential impact on my life.

Different patterns of social media use exist around the world due to a variety of factors, including cultural norms, awareness of online risks, the presence of educational initiatives, government regulations, economic factors, and varying access to technology. In my own case, my social media usage patterns may be influenced by my cultural background, my level of awareness about online security, and my individual preferences and habits.

October 23, 2023, 5:00 PM EST

Article Review #1

Title: The Present and Future of Cybercrime, Cyberterrorism, and Cybersecurity

Authors: Kyung-shick Choi and Claire Seungeun Lee

Publication Date: August 2018

The article on cybercrime and cybersecurity effectively demonstrates the close alignment between these topics and key social science principles. By taking an interdisciplinary approach that draws from criminology, psychology, and sociology, it delves into the complex interplay of human behavior, ethics, and societal influences in the digital realm.

Summary:

The article “The Present and Future of Cybercrime, Cyberterrorism, and Cybersecurity” dives into cyber criminology, an interdisciplinary discipline that incorporates information from criminology, psychology, sociology, computer science, and cybersecurity. The authors stress the linked nature of cybercrime and cybersecurity, which spans several locations, platforms, and actors. They also emphasize the dynamic character of cybercrime, particularly in light of the ongoing growth of technology.

The International Journal of Cybersecurity Intelligence and Cybercrime (IJCIC) is launched as a platform that will help the field expand. The journal aspires to engage with researchers, policy analysts, practitioners, and others to improve cybercrime and cybersecurity theory, methodologies, and practices at the regional, national, and worldwide levels. The authors examine cybercriminology multidisciplinary character, concentrating on its significance in understanding the causes of cybercrime. According to them, cybercriminology strives to give insights into the origins and repercussions of criminal acts in cyberspace, as well as legal issues, ethical concerns, and preventive and control techniques. This field is critical in informing the legal, criminal, and law enforcement procedures.

The article discusses two study areas in cybercriminology. The first entails applying general criminological ideas to cybercrime, such as social control, self-control, lifestyle, and delinquency theories. The second strand entails developing new cybercrime-specific theories, such as cyber-routine activities theory and space transition theory. The authors believe that more interdisciplinary approaches are needed, particularly in linking social disciplines such as criminology, psychology, and sociology with technological subjects like as computer science and cybersecurity. The International Journal of Cybersecurity Intelligence and Cybercrime aims to investigate the origins, patterns, causes, motives, and trends of cybersecurity and cybercrime. The journal’s debut issue includes research articles, policy papers, and comments that provide international, global, and policy views on themes such as illicit social media material, cyberterrorism, social engineering, hackers, and cyber social deviance. The authors also argue for the introduction of multidisciplinary cybersecurity programs in higher education to enhance knowledge and advancement in this subject.

The article analyzes the rising frequency of hazardous interactions and content on social media, underlining the difficulties in properly controlling such information. It underlines the trend away from self-regulation and toward more coercive and punitive tactics intended to push media companies to adopt tougher safeguards against unlawful and harmful material. In addition, the article investigates online hate speech and its empirical testing. Domestic and international terrorist organizations are exploiting online to spread their beliefs, recruit members, and explain their activities. The authors cite research that examines Al Qaeda and ISIS’s use of cyber resources, offering light on the various techniques these organizations employ for online propaganda and recruiting.

In conclusion, “The Present and Future of Cybercrime, Cyberterrorism, and Cybersecurity” not only provides a comprehensive overview of the interdisciplinary field of cybercriminology but also underscores the urgent need for collaborative approaches in addressing the challenges posed by cybercrime and cybersecurity. Additionally, the authors emphasize the pervasive nature of cybercrime and cybersecurity, spanning various platforms, locations, and actors. Their call for active participation from scholars, policy analysts, practitioners, and stakeholders on national, regional, and international levels highlights the urgency of advancing theories, methodologies, and practices within the cybersecurity and cybercrime realm.

Article Source: The Present and Future of Cybercrime, Cyberterrorism, and Cybersecurity

September 27, 2023, 5:00 PM EST