Journal Entry #8: Hacking Movies – Are They Real?

After watching the video, I can think of many ways media influences our understanding of cybersecurity. The idea that a hacker is still a kid or young man in their basement is still very much alive and 99 percent wrong. Many people also have the wrong notion of “I don’t have anything of value”. As…

Article #1 Review

The article I selected is Cyberbullying: Its Social and Psychological Harms among Schoolers from the International Journal of Cybersecurity Intelligence & Cybercrime. The article related to the social sciences through sociology, psychology, and criminology. Bullying is defined as unwanted aggressive behavior by young people against another. It causes distress and harm to the targeted youth….

Journal Entry #5: Motives for Cybercrime

Cybercrime is a massive beast that many are trying to benefit from and other want help to control the damage done by and through it. The amount of motives is as big as the consequences of doing it, or being victims of it. But the some of the principal motives are entertainment, political motivation, revenge,…

Journal Entry #4: Maslow’s Hierarchy of Needs and Technology

Maslow’s Hierarchy of Needs is a psychology theory that suggest the humans are motivated by specific needs. These needs are organized in five principle categories: physiological, safety, love and belonging, esteem and self-actualization needs. In personal terms, technology for me has been vital for more than 20 years. Starting with physiological needs technology has been…

Journal Entry #3: PrivacyRights.org and data breaches

The data provided by PrivacyRights.org has been already cleaned and normalized. Also, it is only data of publicly available information. Because of this, it does not represent all data breaches in the history of the USA. On the other hand, the data can be use to pin-point the data breach type and the type of…

Journal Entry #2: Principle of Science and Cybersecurity

The scientific principle are relativism, objectivity, parsimony, empiricism, ethical neutrality, and determinism. In the definition provided on the slides, Relativism can be interpreted as relation between things. How a change in one system affect another? In terms of cyber security and social science, how the constant bombarding of information overwhelms or changes people behavior? Many…

Journal Entry #1: NICE Framework

After reading through the NICE Framework, three areas appeal to me. First one, is digital forensics. The idea of following a process to preserve and analyze data in support of network vulnerability mitigation are of great interest to me. Second the Vulnerability assessment and Management, assessing risk and recommending counter measures, I consider interesting. I…