{"id":332,"date":"2024-12-04T19:38:49","date_gmt":"2024-12-04T19:38:49","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/?page_id=332"},"modified":"2024-12-09T04:31:56","modified_gmt":"2024-12-09T04:31:56","slug":"journal-entries","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/journal-entries\/","title":{"rendered":"journal entries"},"content":{"rendered":"\n<p>note: journal entries 5-7 and cannot be found<\/p>\n\n\n\n<p>journal entry 8<\/p>\n\n\n\n<p> Most of the time the media changes certain things when portraying professions. I think often time the media gets hacking and cybersecurity wrong. However, in the video it shows a scene from Mr. Robot, where Elliot is at a DEF CON event where the objective was to capture the flag inside of the game, which was a real challenge at DEF CON in 2012. Another scene that the video went over was from Skyfall. This scene was when Q was in the computer trying to find a password, and the screen had big 3d animations playing on it and when trying to get the password it showed a hexadecimal code where that was wrong because of the letters and numbers in it.<\/p>\n\n\n\n<p>journal entry 9 <\/p>\n\n\n\n<p>I got a 2\/9 on the test,  I think the questions are very reasonable.  I think most internet users in world will score different due to childhood upbringing, social norms, and countries laws.<\/p>\n\n\n\n<p>journal entry 10 <\/p>\n\n\n\n<p>In the article it mostly focuses on russian propaganda through social media. I think that social<br>media companies should try to identify bot accounts and eliminate them. However, free<br>speeches are important, so censorship should be avoided. People should educate themselves<br>on how to spot fake news.<\/p>\n\n\n\n<p>journal entry 11<\/p>\n\n\n\n<p>The social themes that arise in the presentation are: get experience, continue to enhance your technical<br>skills, recognize that cybersecurity is interdisciplinary, and make sure you have a hard work ethic. One of<br>the major things discussed by the speaker is how to get experience. She suggests creating your own<br>projects or approaching the IT department where you work. For college students, she recommends<br>internships or even approaching the dean\u2019s office to work in the university\u2019s technical department.<br>Another idea that she shares is volunteering in the technical department od a non-profit or a large<br>church. When it comes to enhancing technical skills, the presenter refers to obtaining certifications,<br>such as CompTia CySA+. Another thing that she discusses is how there are various roles in cybersecurity<br>(i.e. cybersecurity is interdisciplinary ). She recommends STEM degrees, specifically Computer Science<br>and IT for their broad application. Finally, a hard work ethic is one of the first things that comes up<br>because she talks about if you\u2019re willing to work a graveyard shift, you can learn a lot and the pay is<br>generally higher.<\/p>\n\n\n\n<p>journal entry 12<\/p>\n\n\n\n<p>One economic theory that relates to the sample breach letter is rational choice. According to the letter,<br>after the incident the platform provider has worked with an outside firm to remove the malware from<br>its systems and is now actively monitoring the platform. This may indicate that they have learned their<br>lesson and have made the rational choice to invest in cybersecurity.<br>Part of Marxian economic theory is that poor individuals may be more vulnerable to cybersecurity<br>threats. The letter recommends that customers review their own banking and card statements for<br>suspicious activity. But this notice is coming more than a year after the breach began. Wealthy<br>customers may have paid someone to monitor their records all along, but poor individuals may not<br>know if there was suspicious activity a year ago.<br>General deterrence theory relates to the behavior of the hacker(s) that placed the malware. In our text<br>book, Anol Bhattacherjee writes that, \u201cswiftness, severity, and certainty of punishments\u201d affect criminal<br>behavior. In this case, it took nearly a year for anyone to notice that a crime had even been committed<br>and it sounds like the investigation is still going on since the platform provider offered to cooperate with<br>law enforcement. There doesn\u2019t seem too much of a deterrent to the hacker(s).<br>The elaboration likelihood model also relates to the sample breach letter. Customers don\u2019t have the<br>expertise to evaluate cybersecurity procedures of software. So, the letter does not go into detail about<br>this. Instead it says things like, \u201ca leading cybersecurity firm\u201d and \u201cactively monitoring\u201d as peripheral<br>cues that experts are handling the situation.<\/p>\n\n\n\n<p>journal entry 13 <\/p>\n\n\n\n<p>I think it is interesting that the study found that There were fewer valid reports per month for financial,<br>retail, and medical companies. The researchers theorized that vulnerabilities are not being reported on<br>HackerOne for the finance industry because the hackers can maliciously monetize them and because<br>healthcare data records contain personally intimate details they are more monetarily valuable and,<br>rather than collect a bug bounty, hackers sell them on the black market. We normally think of hackers as<br>either good guys (white hat hackers) or bad guys (black hat hackers). However, these findings imply that<br>an individual could be either depending on the situation. The same person might be a white hat hacker<br>when there\u2019s no real incentive for them to be malicious, and a black hat hacker when they see it as an<br>opportunity.<\/p>\n\n\n\n<p>journal entry 14<\/p>\n\n\n\n<p>Andriy Slynchuk identifies 11 illegal things. I think that extracting audio from YouTube and, using<br>copyrighted images, torrent services, or unofficial streaming services are all more or less the same thing:<br>stealing someone\u2019s creation. I choose to focus on using copyrighted images because it is something I<br>have probably done without knowing it while adding a photo to a report or presentation for one of my<br>classes in high school. It\u2019s wrong to steal a photographer\u2019s work without permission. I think bullying and<br>trolling is another of the more serious illegal things. Slynchuk states that bullying is usually treated as a<br>civil offence, but because many young people have needed therapy or even committed suicide because<br>of cyberbullying I think it is very serious. Recording a VoIP call without consent is something else I think<br>is very serious. Everyone should have a right to privacy and taking that from them is serious. Also, the<br>reasons for recording someone without them knowing could be for blackmail, bullying, or some other<br>illegal reason. Slynchuk points out that collecting information about children younger than 13 is a<br>violation of the Children\u2019s Online Protection Act. Websites and browsers collect all kinds of information<br>about us. When they collect information about young children they could be putting them in danger.<br>Even if the child isn\u2019t in actual danger, a child might not know what they are doing and it is wrong to<br>target them with online advertisements where they could make purchase by clicking a link. Finally, I<br>think illegal searches are very serious. I\u2019m a little confused because Slynchuk says that your activity after<br>some searches can be monitored by authorities, but he also said that Google doesn\u2019t report illegal<br>searches. Maybe if you are already a suspect the authorities can get a warrant for your searches. I think<br>some searches, like for child pornography, are so serious that they should be reported.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>note: journal entries 5-7 and cannot be found journal entry 8 Most of the time the media changes certain things when portraying professions. I think often time the media gets hacking and cybersecurity wrong. However, in the video it shows a scene from Mr. Robot, where Elliot is at a DEF CON event where the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/journal-entries\/\">Read More<\/a><\/div>\n","protected":false},"author":29645,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages\/332"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/users\/29645"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/comments?post=332"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages\/332\/revisions"}],"predecessor-version":[{"id":344,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages\/332\/revisions\/344"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/media?parent=332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}