Journal Entry #7

on
“Look at all these passwords and login credentials coming in! Wireshark, I love you.”

“It says that it doesn’t like my password! Well, let’s just try Password123 and see if it accepts it.”

“Using the public Wi-Fi at cafes is just great! My private and personal information is totally safe!”

“Let’s see if I can get a reverse shell on my target. Hopefully, no one will suspect me from up here.”
“I know that we’ve been using the Splunk SIEM for a long time now, but I think that it is time to give Rapid7 InsightIDR a try.”
“I just got paid a bounty for the XSS vulnerability that I reported on Bugcrowd! It’s going to be a good day.”
“I wonder what kind of open-source intelligence I can gain from these pictures?”
“Let’s take a look at some of the news articles about cyber-attacks. Shall we? Another ransomware attack? Typical”

“Alright folks, say it with me! I promise to not click on the weird looking hyperlink that is in the email message.”
“Wow. Did she really just give me her phone without thinking about all of her personal information that can be looked at?”

All of the pictures are talking about how the use of technology can be dangerous. They all stress the point of being safe online and give scenarios of where information can be compromised and/or stolen. Human Systems Integration is an interdisciplinary managerial and technical approach to developing and sustaining systems which focuses on the interfaces between humans and modern technical systems. The objective it is to provide equal weight to human, hardware, and software elements of system design throughout systems engineering and lifecycle logistics management activities across the lifecycle of a system. The end goal of HSI is to optimize total system performance and minimize total ownership costs. The use of technology can be good, but it can also be bad. There are a lot of bad people out there that want to steal a person’s information or perform an attack on someone or something. We have to be careful about what information we put out there and where we choose to use the services that technology and the Internet provide.

Leave a Reply

Your email address will not be published. Required fields are marked *