Journal Entries
Journal #1: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
I am deeply passionate about Leadership, which centers on devising and executing strategies to enhance the quality of care within the NHS. This domain also emphasizes staff development, motivation, and engagement. I am drawn to this area because it aligns with my skills and allows me to make a meaningful impact on individual and community health.
On the other hand, the Information and Technology domain, which focuses on leveraging technology to streamline NHS services, resonates with me to a lesser extent. While I recognize its importance, I don’t feel as passionate about it, as human interaction remains crucial in delivering healthcare.
In summary, my primary interest lies in the Leadership domain of the NICE Workforce Framework. It allows me to utilize my skills to positively influence individual health outcomes and the broader community, making it the most appealing domain.
Journal #2: Explain how the principles of science relate to cybersecurity
Science principles play a crucial role in cybersecurity, as both fields rely on systematic approaches, rigorous methodologies, and empirical evidence to understand, analyze, and address complex problems. Here’s how the principles of science relate to cybersecurity:
- Empirical Evidence: Both science and cybersecurity rely on data-driven approaches to understand and address problems, using real-world data to identify vulnerabilities and threats.
- Hypothesis Testing: Cybersecurity professionals formulate and test hypotheses about potential vulnerabilities through penetration testing, refining their understanding of risks.
- Predictive Modeling: Predictive models are used in cybersecurity to forecast threats and detect abnormal activities, similar to scientific predictive modeling for anticipating outcomes.
- Continuous Learning: Both fields require staying updated with the latest research and methodologies to adapt to evolving challenges effectively.
- Interdisciplinary Approach: Cybersecurity, like science, draws upon various disciplines, such as computer science, mathematics, and behavioral science, to address complex problems.
- Ethical Considerations: Both fields adhere to moral principles and consider factors like privacy and data protection when developing solutions.
- Collaboration: Collaboration between professionals and organizations is crucial in science and cybersecurity for validating findings and collectively addressing challenges.
Journal #3: Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.
Researchers can use the information available on PrivacyRights.org to study data breaches in several ways. First, they can analyze data breaches’ types, frequency, and scale over time to identify trends and patterns. This can help them understand which sectors are most vulnerable to breaches and what kinds of data are most often compromised. Second, they can use the details of the specific violations to study the methods used by hackers and the vulnerabilities they exploited. This can provide insights into the tactics and techniques of cybercriminals, which can be used to develop more effective security measures. Third, they can examine the responses to breaches by companies and regulators to assess their effectiveness and identify best practices for managing and mitigating the impact of breaches. Finally, they can use the data to conduct statistical analyses and build predictive models to forecast the likelihood of future breaches.
Journal #4: Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
Maslow’s Hierarchy of Needs is a psychological theory that categorizes human needs into five levels, each building upon the previous one. These levels are:
- Physiological Needs: These are the basic survival needs, such as food, water, and shelter. Regarding technology, my experiences with smartphones and online food delivery services fulfill these needs. For example, I can use my smartphone to order food and deliver it to my doorstep, ensuring that my physiological needs are met.
- Safety Needs: include personal security, financial stability, and a safe environment. Technology plays a role in meeting these needs through home security systems, online banking, and emergency alert systems. For instance, I can use a home security system to monitor and protect my living space, providing safety.
- Love and Belongingness Needs: involve social interactions, relationships, and a sense of belonging. Social media platforms and messaging apps help fulfill these needs by allowing me to connect and communicate with friends and family, even if they are far away. Through these digital platforms, I can maintain relationships and feel a sense of belonging to various communities.
- Esteem Needs: These include self-esteem and the desire for recognition and respect from others. Technology can contribute to fulfilling these needs through platforms that allow individuals to showcase their skills and achievements. For example, online portfolios or social media profiles can be used to display accomplishments and receive validation from others.
- Self-Atualization Needs: involve personal growth, self-fulfillment, and reaching one’s full potential. Technology can support self-actualization by providing access to educational resources, online courses, and platforms for creative expression. For instance, I can use online learning platforms to acquire new skills and pursue personal interests, contributing to self-actualization.
In summary, Maslow’s Hierarchy of Needs can be related to technology in various ways. Technology plays a significant role in meeting these needs in today’s digital age, from fulfilling basic physiological needs to supporting personal growth and self-actualization.
Journal #5: Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
- Recognition: Recognition tops the list because everyone desires acknowledgment for their efforts and achievements. Being recognized boosts self-esteem and motivates individuals to excel in their work and pursue positive actions in various aspects of life. https://www.theregister.com/2021/06/30/bradley_niblock_election_ddos/
- Entertainment: Entertainment is essential as it is vital in providing relaxation and happiness. Platforms like YouTube offer a wide array of videos to help people unwind while listening to their favorite music, which aids in reducing stress and promoting mental well-being. https://9to5mac.com/2021/07/19/man-behind-linkedin-scraping/
- Political: Understanding politics and governance is crucial for informed decision-making. Being politically aware enables individuals to grasp the laws and regulations of their country, fostering responsible citizenship. https://economictimes.indiatimes.com/magazines/panache/new-generation-of-angry-youthful-hackers-join-the-hacktivism-wave-adding-to-cyber-security-woes/articleshow/81707844.cms
- For Money: Financial management is essential for making informed purchasing decisions and avoiding unnecessary expenditures. It’s crucial to spend money wisely, prioritize needs over wants, and refrain from engaging in illegal activities. https://threatresearch.ext.hp.com/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-their-money-infographic/
- Multiple Reason: Conflicting motives can lead to disagreements and conflicts. Clear communication and understanding are crucial to resolving differences and fostering harmony. https://www.infosecurity-magazine.com/news/what-drives-hackers-to-a-life-of/?__cf_chl_jschl_tk__=pmd_c1d89a4695edbd23f2bceb54d70f35ce5e536e86-1626721164-0-gqNtZGzNAfijcnBszQi6
- Revenge: The desire for revenge often stems from perceived wrongs done by others. However, it’s important to consider the consequences before seeking revenge, as it may perpetuate a cycle of negativity and harm. https://newsfromwales.co.uk/revenge-porn-victims-in-wales-often-feel-let-down-by-the-law-as-cybercrime-slips-through-the-net/
- Boredom: Avoiding boredom is essential for personal growth and maintaining an active lifestyle. Engaging in meaningful activities and hobbies can add excitement and purpose to life, enriching the overall experience. https://www.heraldlive.co.za/news/2021-05-31-cyberbullying-and-online-sexual-grooming-of-children-on-the-increase/
Journal #6: How can you spot fake websites? Compare three fake websites (don’t access those sites, of course) to three real websites. What makes the fake websites fake?
Spotting fake websites requires attention to critical indicators. Fake sites often have misspelled or altered URLs mimicking legitimate ones and exhibit poor design with low-quality images and inconsistent fonts. They may lack clear contact information and proper security measures like SSL encryption. Spelling and grammar errors can also signal a fake site. In contrast, legitimate websites feature high-quality design, straightforward navigation, and consistent branding. They provide accurate contact details, robust security, and high-quality content. By sifting through these aspects, you can identify fake websites and safeguard against online scams. Now, let’s compare three fake websites and three real websites based on these criteria:
Fake websites: misspelled or slightly altered URLs that mimic legitimate sites, poor quality with low-resolution images, and lack of SSL certificate.
- www.amaz0n.com
- paypa1.com
- bankofamerica-login.com
Real Website: Legitimate websites have clear, concise, and correctly spelled URLs that match the official brand or organization name, a professional design with high-quality images, and an SSL certificate present.
- www.amazon.com
- www.paypal.com
- www.bankofamerica.com
Journal #7: •Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s). Explain how your memes relate to Human-centered cybersecurity.
- https://unsplash.com/photos/ICTKcvnXx_8 Man in a black and white striped polo shirt sitting on a chair in front of a silver MacBook. Meme: Image caption – “When your password is ‘password123’.”
- https://unsplash.com/photos/R6dSBkz32B8 A Woman in a white button-up shirt holding a silver iPhone 6 looks happy. Meme: Image caption – “Data breach? New Instagram follower!”
- https://unsplash.com/photos/Z3ownETsdNQ A Man sitting on a concrete brick with an opened laptop on his lap. Meme: Image caption – “Did I lock my laptop at the coffee shop?”
Human-centered Cybersecurity: These memes highlight common human behaviors and emotions related to cybersecurity. The first meme emphasizes the importance of strong passwords, reminding users to avoid using easily guessable passwords. The second meme touches upon the disconnect between the joy of social interactions and the seriousness of data breaches, urging users to prioritize their online security. The third meme focuses on the vulnerability of leaving devices unlocked in public spaces, encouraging users to be mindful of their digital security habits.
By connecting these relatable scenarios to cybersecurity awareness, these memes serve as humorous yet impactful reminders of the human element in cybersecurity and the importance of proactive security practices.
Journal #8: After watching the video, write a journal entry about how you think the media influences our understanding of cybersecurity.
The media plays a significant role in shaping public views and understanding of numerous topics, including cybersecurity. However, it’s essential to recognize that media portrayals often deviate from reality, leading to skewed representations and fostering misconceptions about cybersecurity. Acquiring a comprehensive understanding of cybersecurity’s ethical and legal dimensions is crucial for individuals to discern accurate information and form informed opinions on the subject.
Firstly, it’s widely acknowledged that movies frequently present hacking exaggeratedly and unrealistically. For example, cybersecurity experts have highlighted discrepancies in movie portrayals where hackers effortlessly breach highly secure systems within seconds, contrary to the meticulous and time-consuming nature of actual hacking processes (Insider, 2021). Such misrepresentations can mislead viewers into underestimating the complexity involved in hacking. Moreover, some films romanticize hacking, portraying it as a thrilling and glamorous pursuit, creating a perception that hacking is benign and enticing. Additionally, the stereotypical depiction of hackers as malicious criminals or socially inept individuals in movies fosters a narrow and biased understanding of their appearance and motivations.
In conclusion, cybersecurity remains a critical concern in today’s society. While movies primarily serve entertainment purposes, viewers must recognize that they can distort perceptions on various subjects. Therefore, individuals should be encouraged to critically assess information presented in the media and seek reliable sources to understand cybersecurity better.
Reference
Insider. (2021). Hacker rates 12 hacking scenes in movies and TV: How is it real? YouTube. https://www.youtube.com/watch?v=6BqpU4V0Ypk&ab_channel=Insider
Journal #9: Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
I scored three out of nine on the SMD scale. The items in the scale are designed to assess various problematic behaviors and feelings associated with social media use. They cover many potential issues, from preoccupation and tolerance to conflict and deception. Each item aims to capture a different facet of social media disorder, providing a comprehensive view of an individual’s relationship with social media. Cultural norms, technological access, social pressures, and individual preferences could influence different patterns of social media use worldwide. Cultural attitudes towards technology, social interactions, and work-life balance can all affect how people engage with social media and its potential impact on their lives.
Journal #10: Read this and write a journal entry summarizing your response to the article on social cybersecurity
The article underscores the growing importance of information and psychological warfare in modern conflicts, highlighting the vulnerability of a country’s internal dynamics to external manipulation. It emphasizes the critical role of trust between the military, civil leadership, and society, noting that erosion can lead to reduced effectiveness and morale.
A key takeaway is the need for agile policies that enable maneuverability in the information domain while safeguarding privacy and adhering to legal authorities. The article stresses the importance of education, policy development, and interagency collaboration in addressing the challenges of the modern information environment.
In summary, social cybersecurity is a vital discipline for the foreseeable future, requiring a multidisciplinary approach to safeguard national security and maintain trust between the military and society.
Reference:
Journal #11: As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
Nicole Enesse’s presentation on the role of a cybersecurity analyst reveals several key social themes. The talk emphasizes the importance of accessibility and inclusion in cybersecurity, highlighting that individuals without a traditional STEM background can excel in this field with the proper training and certification programs.
Another notable theme is economic mobility; cybersecurity roles are among the highest-paying jobs, offering the potential to significantly improve one’s lifestyle, particularly in high-wage cities. The presentation also touches on the work-life balance and flexibility expected in cybersecurity positions, making them appealing to those seeking careers that accommodate diverse lifestyles.
Reference:
Enesse, N. (2021). What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook. YouTube. https://www.youtube.com/watch?v=iYtmuHbhmS0&ab_channel=NicoleEnesse
Journal #12: Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.
The sample data breach notification letter can be analyzed through the lenses of information asymmetry and market failure theories in economics. The delay in informing customers highlights information asymmetry, potentially eroding trust between the company and its customers. Additionally, the breach represents a market failure, imposing unforeseen costs on customers due to negative externalities. From a social sciences perspective, the breach impacts trust and risk perception, potentially influencing customers’ future behaviors and interactions with the company. Overall, the notification underscores economic challenges related to information transparency and market efficiency and social implications concerning trust and risk awareness.
Journal #13: . Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
The study on bug bounties offers valuable insights into the effectiveness of incentivizing security researchers to identify vulnerabilities. The literature review supports bug bounties as a cost-effective cybersecurity strategy. The findings reveal that security researchers are motivated by non-pecuniary factors, allowing companies to benefit from bug bounties even with limited financial resources. Interestingly, a company’s revenue and brand profile do not significantly impact vulnerability reporting, challenging conventional assumptions—sector-specific variations in reporting hint at potential disparities in security practices across industries. Lastly, the study highlights the need to continuously adapt bug bounty programs as they age to maintain effectiveness. The study provides a nuanced understanding of bug bounty dynamics, offering valuable insights into cybersecurity policy and practice.
Journal #14: Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
Andriy Slynchuk outlines eleven potential illegal activities that internet users might unknowingly engage in, highlighting the importance of understanding and adhering to legal boundaries online. Among these, the five most serious violations include using unofficial streaming and torrent services, which undermine intellectual property rights and contribute to the spread of pirated content. Sharing personal information without consent, such as passwords, addresses, or photos of others, breaches privacy rights, exposes individuals to potential harm, and compromises trust in online interactions. Engaging in cyberbullying and trolling not only has severe emotional and psychological impacts on victims but also undermines online civility and can lead to legal consequences. Recording VoIP calls without consent infringes upon privacy rights and confidentiality, posing ethical and legal concerns. Lastly, collecting information about minors without parental permission violates child privacy laws, exposing vulnerable individuals to potential risks and exploitation. These severe offenses highlight the need for internet users to be aware of their actions online, adhere to legal and ethical standards, and prioritize privacy, security, and respect in digital interactions to maintain a safe and respectful online environment.
Journal #15: •Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.
Davin’s career in digital forensics is intriguing, showcasing the diverse challenges and societal implications of investigating digital crimes. His focus on identifying internal threats within organizations and handling anonymous death threats highlights the intersection of technical expertise and understanding human behavior.
From a social sciences perspective, Davin’s work emphasizes the importance of ethics, human motivations, and cultural sensitivity in digital investigations. His global experience underscores the universal nature of cybercrimes and the need for adaptability across different cultures and regions.
His transition from consultancy to leading a global forensic team demonstrates versatility in this dynamic field. His educational background in Commerce and Financial Management complements his forensic skills, reflecting the interdisciplinary nature of digital forensics.
Davin’s commitment to work-life balance and family underscores the importance of well-being in a demanding profession. Overall, his career path serves as an inspiration, highlighting the multifaceted nature of digital forensics and the blend of technical and social sciences insights required to navigate its complexities.