Journal Entry 1
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least
In the national initiative for cybersecurity education or NICE framework, the area that I would like to focus on in my career is investigating operating and maintaining. It interests me because when you investigate you will find the flaws of the event or crime that could have been prevented or solved in a timely matter. Then that, when to operate and maintain, comes in, when a person sees a similar flaw or notices something is wrong or download with permission. They can take action by preventing the same flaw to happen again. It was hard for me to choose one that appeals the least because all of it is very important to focus on, but it will be overseen and governed. The idea of overseeing and governing is a concept I am very good at because when I was working in a previous job my boss has complete confidence in me to make sure everyone is doing the correct job. Sometimes my boss gave me extract privileges with more responsibility on my back such as making sure the new employee is training right making sure he signs all the paper, etc.
Jounral Entry 2
The scientific principles are made up of seven parts. They are relativism, objectivity, parsimony, objectivity, skepticism, ethical neutrality, and determinism. All these principles can be applied to the study of cybersecurity through a social science framework. Relativism is to understand the meaning of everything that is related. For cybersecurity, it is related because when technology steadily advances so does in other parts of technology it is an endless loop. An example is a technological system that led to the development of cyberspace. The social system, health care system, critical infrastructure system, the criminal justice system, technological system, political system, and education system can lead to changes in cybersecurity. Objectivity is how scientists study the topic in a value-free manner. It is related to cybersecurity because we have to figure out how to punish the hackers and how technology should be used in the right ways without being biased. Parsimony means scientists should keep their levels of explanation as simple as possible so people can understand what is happening towards their system. In cybersecurity, there are mand terms that the normal person will not know. So scientists show to explain it simply so the client will understand. Empiricism is when a social scientist can only study behavior with your senses. Such as the information we gain from a scientist who discovers cybercrime that is happening in the present and future to prevent how to protect the system. Ethical neutrality is when scientists must adhere to ethical standards when conducting research. It relates to cybersecurity because when scientists study crime they need to figure out how did they manage to get it and what laws did they break. Determinism is that behavior is caused, determined, or influenced by events. This is related to cybersecurity because people who work at cybersecurity try to figure out the mindset of their acts when they hack.
Journal 3
Abraham Maslow’s hierarchy of needs has five levels. They are self-actualization, esteem needs, belongingness and love needs, safety needs, and physiological needs. This concept suggests that all humans have needs that exist. When our needs are met, we people continue to have more needs in the future and our behavior might change. In the level of physiological needs, its focus is on food, water, warmth, etc. It relates to technology because we have houses that have man product of technology such as the heater/ac, lights in the house and when we use the phone to order food. The level of safety needs its focus on security and safety. Such in modern-day we use cameras everywhere such as schools to make sure nothing bad is happening. In the third level, belongingness and love need to relate to technology because at present people use their phones to communicate with each other and also have dating apps to find people to fall in love with. For esteem needs, it focuses on prestige and feeling of accomplishment. People around the world use their computers to gain information to eventually get a certificate in the career they are pursuing such as for cybersecurity. You can get the CompTIA certificate that will make your resume look better in an interview for a job. The last level is self-actualization is when someone achieves one’s full potential and creativity. Technology in the present time can make people super creative such as when designing a house. People can use apps on the computer to lay out what the house should look like or design a cartoon show to look so realistic.
Journal 4
Individual motives depend on individuals and the crime they did. They are seven individual motives for someone who will do cybercrimes. They are for entertainment, political, revenge, boredom, recognition, money, and multiple reasons. I will be ranking the motives from one that makes the most sense and seven be the least sense.
One will be for money, everyone in this world when they grow needs money to survive in this world. Even right now I wish I had extra money to have fun, but I don’t.
Two will be revenge when we people get emotionally damaged by a past event either getting bullied or personal information being exposed without your consent. People usually want to get revenge on the person or company. That is how I completely understand this motive.
Three will be political, every country has its problems with terrorists or hacktivism, especially in present. Such as anonymous hacking into Russian websites. Every country wants to get information to use gain leverage.
Four will be recognition, people like to get recognized for their accomplishments such as getting a bachelor’s in Cybersecurity. Especially hackers when it comes to hacking into a system and showing proof that they did hack into the system.
Five will be multiple reasons, this motive is somewhat confusing because hackers can just have a reason to test out their new virus or to polish their skills. For me, it is a completely random decision to cause harm to people.
Six will be boredom, I don’t understand how people will be so bored till the point to harm people online. In my point of view, I don’t see how that will be fun if everyone in this world has feelings. That is where the motive of entertainment comes in my ranking.
Entertainment will be number seven on my ranking. How is fun to harm people you don’t know till the point people kill themselves or have mental damage and trust issues. How is fun to gain money by continually harming the same person for profit. This motive makes me so mad.
Journal 5

The meme that I created is a dog look at the computer so concentrated. The dog is supposed to represent a human being so connected to their laptop and many other electronic devices that it is like we humans just follow technology. Dogs usually follow a ball to be happy but for humans, we go to technology to find purpose, to make us laugh, or to even harm other people. I wrote the phrase “back at it again” because every day no matter where we are at we people are always connected to technology. You may say how is the meme connected to cybersecurity? Will to answer the question we humans are so connected to many of the problems, solutions, and advancements in cybersecurity. Such as the policies that are placed due to people’s ideas or terrible viruses to gain information against rival nations. In order to counteract these problems, people must make solutions towards vicious ideas to mentally torture a specific person, to get revenge, or just to have fun because they are bored. But we people also strive to gain advancements in technology to make this world a better place to have fun, to travel around, to gain jobs, and many more. We people are like the meme that wherever technology goes we follow. It is like an endless loop that we are always “back at it again” whether it will be for the best attention or bad attention we always see human society involved with cybersecurity. In the future, it will continue to grow the risk, so we people have the responsibility to solve them in order to protect ourselves from technology.