{"id":294,"date":"2024-12-04T01:36:11","date_gmt":"2024-12-04T01:36:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/natemcmillan\/?page_id=294"},"modified":"2024-12-04T01:36:29","modified_gmt":"2024-12-04T01:36:29","slug":"journals","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/natemcmillan\/academics\/cybersecurity-and-social-sciences-2\/journals\/","title":{"rendered":"Journals"},"content":{"rendered":"\n<p><strong>How the Principles of Science Relate to Cybersecurity<\/strong><\/p>\n\n\n\n<p>Cybersecurity is in my opinion, unlike other STEM fields such as Computer Science or Engineering, primarily focused on human factors: how people think, act, and learn, etc.\u00a0 This is necessary in order to understand how to effectively prevent and deter attempts at intrusions in cyberspace.\u00a0 In much the same way, social science differs from other fields of science.\u00a0 The social sciences endeavor to understand humans and how the behave in a society using the fields of psychology, sociology, etc.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>In What Ways Can Researchers Utilize Publicly Available Information about Data Breaches?<\/strong><\/p>\n\n\n\n<p>Researchers can use publicly available information about data breaches in the same manner that military leaders can learn from past encounters with an adversary to understand and predict their next courses of action.&nbsp; Learning how previous breaches occurred enables cybersecurity professionals to close off those avenues of approach in to a network to prevent the same manner of intrusion.<\/p>\n\n\n\n<p><strong>Maslow\u2019s Hierarchy of Needs and How Each Level Relates to Experiences with Technology<\/strong><\/p>\n\n\n\n<p>Our society\u2019s dependence on technology mirrors Maslow\u2019s hierarchy of needs.\u00a0 For example, technology enables us to heat our homes and provides us access to clean drinking water, which are basic physiological needs.\u00a0 Many of our jobs depend on the internet and without those jobs many people would not have safety and security.\u00a0 In addition, the internet also enables to use social media platforms and other forms of digital communication to maintain ties with friends and loved ones that are subject to the tyranny of distance, ensuring that we have love and belonging.\u00a0 Social media also serves as a serotonin booster for those who post to seek validation, fulfilling a need for self-esteem.\u00a0 Finally, technology provides many hobbies and facilitates many passions of society, such as gaming, digital art, etc., fulfilling self-actualization.<\/p>\n\n\n\n<p><strong>Cyber Offending Motives Ranked<\/strong><\/p>\n\n\n\n<ol>\n<li>Money.&nbsp; I believe that similar to many crimes committed outside of cyberspace, money is the primary motivation.&nbsp; Money may also be used to facilitate the pursuit of other motives on this list.<\/li>\n\n\n\n<li>Revenge.&nbsp; I cannot recall how many times I have stumbled across posts on social media made by younger (or immature) people asking around for methods to \u201chack\u201d people that have supposedly wronged them as a form of vengeance.&nbsp;<\/li>\n\n\n\n<li>Political.&nbsp; I believe that many cyber actors understand how dependent the world is on technology, including political organizations.&nbsp; I believe that many people view cyber attacks targeting political entities as \u201ccyber activism\u201d.<\/li>\n\n\n\n<li>Recognition.&nbsp; Undoubtedly people outside of cyberspace commit crimes for the sole purpose of gaining notoriety, whether that be within a closed circle of people or notoriety amongst the public.&nbsp; I don\u2019t believe that applying this logic to cyber space is too big a stretch.<\/li>\n\n\n\n<li>Boredom.&nbsp; In the same manner in which people that I knew growing up who committed crimes purely for the adrenaline rush, cyber actors with the knowledge and skillset may decide to commit a cyber crime just because they can and have nothing better to do.&nbsp;<\/li>\n\n\n\n<li>Entertainment.&nbsp; Same logic as above.<\/li>\n\n\n\n<li>Other reasons.&nbsp; There is an infinite amount of motivations for committing cyber crime, but I do not believe that any of those outrank the previous six.<\/li>\n<\/ol>\n\n\n\n<p><strong>How Can You Spot Fake Websites? What Makes the Fake Websites Fake?<\/strong><\/p>\n\n\n\n<p>The easiest way for me to spot fake websites is by paying attention to whether or not the website utilizes HTTP rather than HTTPs.\u00a0 I also learned a few years back about how a character in the Russian language looks almost identical to \u201ca\u201d in English as typed, and there have been cases of bad actors using the aforementioned Russian character in place of \u201ca\u201d to appear as a legitimate website.<\/p>\n\n\n\n<p><strong>How the Media Influences Our Understanding about Cybersecurity<\/strong><\/p>\n\n\n\n<p>When I think of media depictions of hacking, I see the running wall of green text and somebody furiously typing away at a computer.\u00a0 Until I started learning more about computer networking and cybersecurity, I had no reason to believe that this was not the reality.\u00a0<\/p>\n\n\n\n<p><strong>The Social Media Disorder Scale<\/strong><\/p>\n\n\n\n<p>The social media disorder scale attempts to measure degrees of addiction to social media.\u00a0 Somebody who tests low on this scale probably views social media as a waste of time whereas somebody who tests high is somebody who requires constant validation both in real life and they make up the deficit for what they cannot receive in real life via posting on social media.\u00a0 I myself have been at both ends of this spectrum across various chapters of my life and am currently trending towards the lower end of the scale.\u00a0 Different cultures may view social media differently.\u00a0 In the way that it is so engrained in to our every day lives in the western world, it may be the opposite for other parts of the world.<\/p>\n\n\n\n<p><strong>Thoughts on<\/strong> &#8220;<strong>Social Cybersecurity: An Emerging National Security Requirement<\/strong>&#8220;<\/p>\n\n\n\n<p>I completely agree with the viewpoints and information brought forth by this article.\u00a0 A few years ago, Information was added as the seventh warfighting function in the Marine Corps.\u00a0 The Marine Corps and the wider Department of Defense understands the relevance of social media in modern and future conflicts and how easily manipulating social media can sway public opinion of a conflict one way or another.\u00a0 Our adversaries may attempt to leverage social media to spread propaganda (it\u2019s only propaganda if it\u2019s used against you) to cultivate anti-American sentiments.\u00a0 One recent example that comes to mind is the 2016 Presidential election, where supposedly Russian state cyber actors established a network of bot accounts on social media to advocate for Trump.<\/p>\n\n\n\n<p><strong>How the Role of Cybersecurity Analyst Relates to Social Behaviors<\/strong><\/p>\n\n\n\n<p>Cyber incidents do not occur in a vacuum.\u00a0 There is always a person or group of people that initiate any cyber action, therefore it is imperative that any cybersecurity analyst understands human behavior in order to accurately analyze patterns and predict\/prevent future attempts at a network breach.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How the Principles of Science Relate to Cybersecurity Cybersecurity is in my opinion, unlike other STEM fields such as Computer Science or Engineering, primarily focused on human factors: how people think, act, and learn, etc.\u00a0 This is necessary in order to understand how to effectively prevent and deter attempts at intrusions in cyberspace.\u00a0 In much&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/academics\/cybersecurity-and-social-sciences-2\/journals\/\">Read More<\/a><\/div>\n","protected":false},"author":29191,"featured_media":0,"parent":292,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages\/294"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/users\/29191"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/comments?post=294"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages\/294\/revisions"}],"predecessor-version":[{"id":295,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages\/294\/revisions\/295"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/media?parent=294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}