Week 1 –
After reviewing the NICE Workforce Framework, I found out that I want to focus my Cybersecurity career on areas such as “Protection and Defense”, “Cyberspace Intelligence,” and “Investigation.” The reason why these areas in cybersecurity appeal to me is because of my mother, who was a former dispatcher and now supervisor for 911 and because of this person in my life, it makes me want to go into the cybercrime and I believe these fields are the best fit for me to reach my goal. Areas that do not appeal to me for cybersecurity are “Design and Development” and “Oversight and Governance.” These fields do not appeal to me because they do not align with what I want to do in this field.
Week 2 –
In Cybersecurity, Relativism shows how security practices are different across diverse cultures and industry but are still connected in some way, Objectivism ensures that decisions regarding cybersecurity are based on facts rather than opinions. Parsimony encourages cybersecurity personnel to use simple and effective solutions for security challenges rather than complex solutions, Empiricism in cybersecurity relies on real-world data to identify and mitigate threats. Skepticism is used to question the security claims and promises made by companies to keep your data safe. Ethical neutrality helps cybersecurity professionals focus on facts without bias. Lastly, Determinism tells professionals that cyber-attacks and incidents have a specific cause and allows them to make proactive measures to prevent these attacks from happening again.
Week 3 –
Researchers can utilize the extensive database provided by PrivacyRights.org to analyze data breaches by identifying trends and patterns over time. They can determine the most common types of breaches used by hackers, such as hacking, phishing, insider threats, or accidental exposure. By tracking these breaches frequency, researchers can assess which industries or organizations are targeted most often each month by these hacks. Additionally, they can also examine the geographical data to identify which states experience the highest number of attacks, allowing for analysis of regional cybersecurity vulnerabilities. This research helps in understanding evolving threats, improving risk assessments, and developing stronger data protection strategies.
Week 4 –
According to Maslow’s hierarchy of needs everyone needs are: 1. Self-actualization, 2. esteem, 3. belongingness and love, 4. safety, and 5. physiological needs.
5. Physiological needs (food, water, and shelter) – Online food delivery apps (Door Dash, Uber Eats) allows users to order meals conveniently. Smart home technology (Nest, Ecobee) helps regulate temperature for comfortable living conditions. Health-tracking apps (Fitbit) helps people monitor hydration and nutrition.
4. Safety – Smart security systems (Ring) provides home surveillance and alerts. GPS tracking apps (Life360) allows families to keep track of each other’s location.
3. Belongingness & Love – Social media platforms (Instagram, Snapchat) help people stay connected with friends and family. Dating Apps (Tinder, Bumble) help people form romantic relationships.
2. Esteem (status or self-respect) – Video sharing platforms (YouTube, Twitch) allow content creators to showcase their talents. Social media (TikTok, Instagram) – boost self-esteem with likes, comments, and followers.
1. Self-Actualization (Personal growth) – Artists sharing their work online (Instagram). Blogging platforms (WordPress) allows individuals to express their thoughts and ideas.
Week 5 –
- (Most sense) – Money
- Revenge
- Recognition
- Political
- Multiple Reasons
- Entertainment
- (Least sense) – Boredom
I ranked the list this way because most hackers share a common goal: financial gain. Other motivations, such as personal benefit whether through recognition or revenge against someone who wronged them follow closely behind. Political motives and mixed reasons also play a role. However, as we move down the list, entertainment and boredom make the least sense as motivations for hacking. The reason boredom ranks the lowest is that there are countless other ways to entertain oneself, such as playing video games, watching movies, or going outside. Learning to hack is a complex and time-consuming process, so it seems unlikely that someone would go through that effort purely out of boredom.
Week 6 –
Some ways to identify a fake website to a real one is to check the domain name closely and check the domain age (how long the site has been active). The reason why you should check the domain name closely is because the easiest way to tell that you’re on a fake website is when the domain name doesn’t match the official website for the company. The reason why you should check the domain age is because fake websites rarely stay online for long. Examples of fake websites are BankoffAmerica.com (adding an extra “f”), Paypal.com.secure-site.com (in this case, the domain name is actually “secure-site.com” not “paypal.com”), and WaImart.com (using a capital “i” instead of a lower case “l”).
Toohil, Ryan. “How to Identify Fake Websites: 11 Warning Signs to Know | Aura.” Www.aura.com, 17 Nov. 2023, www.aura.com/learn/how-to-identify-fake-websites. Accessed 19 Feb. 2025.
Week 7 –
These three memes below highlight real-world cybersecurity behaviors that the Human-Centered Cybersecurity Program seeks to address. The program focuses on making security intuitive, effective, and aligned with natural human behavior, ensuring that security practices are easier to follow and adopt. By recognizing common cybersecurity challenges people face in their daily digital interactions, the program aims to bridge the gap between security policies and practical user behavior. Through education, awareness, and user-friendly solutions, it fosters a culture where secure actions become second nature, reducing risks while enhancing overall cybersecurity resilience in both professional and personal digital environments.
NIST: Lets reduce Human Error
NIST: Use cybersecurity tools to protect yourself
NIST: Cybersecurity should work for people



Humans: My Password is 123456
People: ‘Free VPN? Sounds legit!
People: Disabling 2FA because it’s “too annoying”
Week 8 –
The video highlights how media often exaggerates hacking, leading to misconceptions about cyber threats and hacker techniques. Many portrayals make hacking appear instantaneous, overly simplistic, or highly visual, which does not reflect reality. This dramatization can create unnecessary fear, making cyberattacks seem omnipotent and unstoppable. On the other hand, it can also trivialize cybersecurity, making it seem like something only elite hackers deal with, rather than a crucial concern for everyone. As the expert in the video points out, real hacking takes time, skill, and persistence—something rarely shown in movies and TV. By misrepresenting hacking, media influences how people perceive digital security, potentially making them less cautious or misinformed about the real dangers and necessary precautions in the cybersecurity landscape.
Week 9 –
How did you score? I had scored a 1 on the scale
What do you think about the items in the scale? I found the questions to be too basic for the scale, as they could have gone more in-depth to provide a better understanding of the topic. The simplicity of the questions may not fully capture the complexities of the subject being measured. A more detailed approach could offer more accurate results
Why do you think that different patterns are found across the world? Regarding the differences in patterns across the world, I believe they are influenced by the varying levels of technology present in different regions. The availability and integration of technology shape behaviors, interactions, and trends in unique ways. Societies with more technological advancements may experience different patterns compared to those with limited access.
Week 10 –
The article “Cybersecurity: The Fifth Domain” explores cybersecurity as a national security priority, linking to social cybersecurity in several ways. It highlights information warfare and influence operations, which adversaries use to spread disinformation and manipulate public perception. Human factors in cybersecurity are also relevant, as social engineering tactics exploit cognitive biases. Additionally, state-sponsored cyber operations often involve psychological warfare, blending traditional cyber threats with mass influence campaigns. Finally, the article discusses the military’s role in cyber operations, which intersects with civilian infrastructure and societal trust. Social cybersecurity extends these concerns by addressing how cyber threats impact democracy, public discourse, and institutional stability. Both fields emphasize resilience against digital manipulation, making them integral to modern security strategies.
Week 11 –
The role of a cybersecurity analyst emphasizes key social behaviors such as collaboration, communication, and trust-building. Analysts frequently work with different teams to share information and address security threats, necessitating strong interpersonal skills. They must also solve complex problems under pressure, adapting quickly to maintain clear communication. Trust is essential, as analysts are responsible for protecting sensitive data, which fosters a culture of cooperation and shared responsibility. These social themes highlight the importance of teamwork in ensuring an organization’s security. By working effectively together and being transparent, cybersecurity analysts help create a dynamic, trustworthy environment crucial to an organization’s success in managing cybersecurity challenges.
Week 12 –
The “Sample Data Breach Notification” from Glasswasherparts.com reveals a cyberattack exposing customer payment information. From an economics perspective, opportunity cost explains the tradeoff in outsourcing website management, sacrificing security oversight for cost savings. Market failure applies, as the breach caused harm to customers through negative externalities and asymmetric information. From social sciences, social contract theory highlights the trust violation between company and consumer because the users expected data protection. Structural functionalism views the breach as disrupting the interconnected system of business, consumers, and law enforcement. Each party’s role supports societal stability, and failure in one (the platform provider) affects all. The letter reflects efforts to restore trust and function through monitoring, transparency, and collaboration with authorities.
Week 13 –
The authors’ literature review emphasizes the crucial role of economic incentives in attracting and retaining ethical hackers, demonstrating that higher rewards correlate with increased participation in bug bounty programs. This increased participation translates to a more efficient and effective vulnerability identification process, allowing organizations to proactively address potential weaknesses in their systems before they can be exploited by malicious actors. The study’s findings strongly support the alignment of financial incentives with broader security goals, arguing that bug bounty programs are not just a cost-effective way to identify vulnerabilities, but also a valuable tool for enhancing overall cybersecurity posture. Ultimately, the authors recommend the integration of bug bounty initiatives into comprehensive cybersecurity policies, emphasizing the importance of embracing external collaboration and leveraging the collective knowledge of the security community.
Week 14 –
The Clario article highlights five serious online violations: faking your identity, collecting data from minors under 13, sharing others’ personal information without consent, cyberbullying, and recording VoIP calls without permission. These actions pose significant risks to both individuals and broader online communities. Impersonating someone can lead to fraud, financial loss, and reputational damage. Gathering data on children without parental consent violates privacy laws and exposes them to serious dangers like exploitation or identity theft. Sharing private content such as passwords, addresses, or photos without consent can result in harassment, doxing, or physical harm. Cyberbullying, including trolling or targeted harassment, can deeply impact a person’s mental health, leading to anxiety, depression, or worse. Recording conversations without all parties’ consent may breach legal protections and damage trust in personal or professional relationships. Each of these offenses has long-lasting consequences, making it essential to follow ethical online practices and understand the laws that govern digital behavior.
Week 15 –
After watching Davin Teo’s TEDx talk, I was intrigued by how his journey into digital forensics highlights a strong connection to the social sciences. Starting as an accountant, Teo transitioned into digital forensics through his exposure to financial crime, showing how economics and criminology play key roles in his work. His career path emphasizes that understanding human behavior, societal impacts, and legal systems is just as important as technical skills. I found it inspiring that he uses both analytical and social insights to investigate cybercrimes. Digital forensics doesn’t just involve computers; it involves people, motives, and ethics. Teo’s journey shows how essential it is to approach technology-related careers with a broader understanding of society, law, and responsibility.