CYSE 201 S Entry #8

Write a journal entry about how you think the media influences our understanding about cybersecurity.

The media plays a significant role in shaping our understanding of cybersecurity. The portrayal of hackers in popular media is often exaggerated and unrealistic. They are often depicted as individuals who can effortlessly infiltrate systems, bypass security measures, and take control of entire systems with just a few keystrokes. However, the reality is far different. Hacking requires a lot of skill, time, and effort; it is more challenging than movies make it out to be. The media’s portrayal of cybersecurity also influences how we perceive the importance of cybersecurity. Many view it as a subject that only affects large corporations or government agencies. However, the truth is that every individual who uses the internet is potentially vulnerable to cyber-attacks. Unfortunately, this message often gets lost amidst the glamorized portrayals of hacking in movies and TV shows. As technology advances, understanding the risks associated with cybersecurity is more essential than ever. We must educate ourselves and our communities on the importance of cyber safety, and we must do so without falling prey to the media’s exaggerated portrayals of hackers and hacking.

CYSE 201 S Entry #7

Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s).

https://unsplash.com/photos/Links to an external site.mfB1B1s4sMcLinks to an external site.

https://unsplash.com/photos/gySMaocSdqsLinks to an external site.

https://unsplash.com/photos/ICTKcvnXx_8Links to an external site.

https://unsplash.com/photos/Z3ownETsdNQLinks to an external site.

https://unsplash.com/photos/5QgIuuBxKwMLinks to an external site.

https://unsplash.com/photos/R6dSBkz32B8Links to an external site.

https://unsplash.com/photos/BXiLSwwvqrYLinks to an external site.

https://commons.wikimedia.org/wiki/File:Computer_user_icon.svgLinks to an external site.

https://commons.wikimedia.org/wiki/File:Summer_school_GLAM_giorno_1_1.jpgLinks to an external site.

https://commons.wikimedia.org/wiki/File:CellPhone_(16491636068).Links to an external site.jpgLinks to an external site.

Explain how your memes relate to Human Systems Integration.

CYSE 201 S Entry #6

Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?

It is crucial to be able to spot fake websites to protect ourselves from potential scams or cyber-attacks. There are a few telltale signs to look out for when spotting fake websites. One of the most common is a URL that appears slightly different from the legitimate website. This could be as simple as a missing letter or a slightly altered domain name. Another red flag is poor website design. Fake websites are often put together quickly and with little attention to detail, resulting in a shoddy appearance. Finally, a lack of contact information or incomplete details, such as missing phone numbers or email addresses, can indicate that a website needs to be more legitimate. By being aware of these indicators, you can help protect yourself from online scams and fraud. Fake websites often have aggressive calls-to-action, cluttered and confusing designs, and spelling and grammar errors. They may also ask for personal information too soon, contain copied content from other websites, or have suspicious links. On the other hand, a legitimate website will have a matching URL, a professional and user-friendly design, and clear contact information. It is essential to be cautious and verify the authenticity of a website before providing any personal information or making a purchase.

CYSE 201 S Entry #5

Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.

In my opinion, the ranking for the motives from 1 to 7 would be as follows:
1. Multiple reasons: This motive makes the most sense because it implies that various factors can drive a person’s behavior. People are complex beings, and their actions can be influenced by various reasons, including those listed above.
2. For money: While it might seem like a shallow motive, pursuing financial gain is a primary driving force for many people. Money can offer security, comfort, and freedom, so it is easy to understand why some prioritize it over other motives.
3. Political: This motive can be powerful because it often involves people’s beliefs and values. People motivated by politics may be driven to take action because they believe it is right or want to make a difference in the world.
4. Recognition: For some people, recognition can be a powerful motivator. Whether it is seeking fame, prestige, or simply acknowledgment for their achievements, the desire for recognition can be a solid driving force.
5. Revenge: While it might feel satisfying at the moment, seeking revenge can often have negative consequences. This motive ranks in the middle for me because while I can understand why someone might need revenge, it is not a productive or healthy motive to prioritize.
6. Entertainment: While entertainment can be an enjoyable motive, it is not necessarily a productive one. People motivated by entertainment may prioritize pleasure and enjoyment over other more important factors.
7. Boredom: Boredom is the motive that makes the slightest sense to me. While it is understandable that people might sometimes feel bored or uninspired, it is not a valid reason to take action. People motivated by boredom may be likelier to make impulsive decisions or engage in risky behavior.

CYSE 201 S Entry #4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

Maslow’s Hierarchy of Needs theory explains what motivates human behavior. According to this theory, humans have five basic needs arranged in a hierarchy, and each level must be satisfied before moving up to the next level. These needs are physiological, safety, love/belonging, esteem, and self-actualization.

Regarding my experiences with technology, my physiological needs are met through access to food, water, and shelter via online ordering and home delivery services. The safety need is completed through security software and online verification systems that protect my personal information from cyber threats. The love/belonging need is met through social media platforms that allow me to connect with friends and family, even if we are physically separated. The esteem need is completed through socail media and other technology tools that will enable me to showcase my talents and accomplishments. Finally, the self-actualization need is met through online learning platforms and other tools that help me develop my skills and pursue my passions.

CYSE 201 S Entry #3

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?

PrivacyRights.org is an invaluable resource for researchers who want to study data breaches in-depth. The platform provides a wealth of information that can be utilized to analyze the frequency and severity of breaches, identify patterns or trends in the types of information compromised, and assess the effectiveness of breach notification and response procedures. Researchers can also leverage this information to understand better the impact of data breaches on individuals and organizations and develop strategies to prevent or mitigate future breaches. The depth and breadth of information available on PrivacyRights.org make it an ideal starting point for any serious research into data breaches, and the insights gleaned from this platform can be used to inform policy decisions and improve security practices.

CYSE 201 S Entry #2

Explain how the principles of science relate to cybersecurity.

Science principles play a crucial role in cybersecurity as the field heavily relies on empirical evidence, testing, and experimentation to develop effective security measures. Cybersecurity professionals use scientific principles to analyze data, identify patterns, and detect anomalies in network traffic, system logs, and other sources of information. They also use scientific methods to test the effectiveness of security controls, simulate cyber attacks, and validate security solutions. In addition, science principles help cybersecurity experts understand the underlying technologies and protocols that power the Internet, computer networks, and software applications. By applying scientific principles to cybersecurity, we can better understand the threats we face, develop more effective defenses, and improve our ability to detect and respond to cyber-attacks.

CYSE 201 S Entry #1

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. Note: Word count should be in between 100 -150 words. 

Of the main categories, ‘Operate and Maintain’ and ‘Oversee and Govern’ are, for the most part, the areas that I am interested in with my career. The ‘Operate and Maintain’ and ‘Oversee and Govern’ categories include specialties areas such as ‘Systems Administration,’ ‘IT Operations,’ ‘Project Management,’ and ‘Policy and Planning.’ While ‘Analyze,’ ‘Securely Provision,’ and ‘Collect and Operate’ are the areas I am not as interested in. The ‘Analyze,’ ‘Securely Provision,’ and ‘Collect and Operate’ categories include areas such as ‘Data Analysis,’ ‘Systems Development,’ ‘Cyber Defense Analysis,’ and ‘Threat Analysis.’ The ‘Investigate’ and ‘Protect and Defend’ categories interest me and would help expand my knowledge more for my career. The ‘Investigate’ and ‘Protect and Defend’ categories include areas such as digital forensics, criminal investigations, network security operations, and vulnerability assessment and management.

CYSE 200 T Entry #7

1. How does cyber technology impact interactions between offenders and victims?

Cyber technology has revolutionized the way offenders interact with their victims. The rise of social media platforms and other online communication channels has made it easier for offenders to locate and target their victims. This is because victims often share personal information on social media, which offenders can use to identify and approach them. Additionally, the anonymity provided by the internet makes it easier for offenders to harass, bully, and intimidate their victims without fear of being caught. 

On the other hand, cyber technology has also provided victims with tools to track and report cybercrime incidents. For example, many social media platforms now have reporting features that enable victims to report abusive behavior. Various software and mobile applications can monitor online activity and detect potential threats.

Despite the benefits of technology, it has also created new challenges for law enforcement agencies, and policymakers need help keeping up with technological advancements. The use of encryption and other forms of digital security make it difficult for law enforcement to

2. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

The development of cyber-policy and infrastructure is a crucial issue in today’s world. However, one of the main challenges in this area is the need for predictive knowledge. The rapid evolution of technology and the increasing sophistication of cyber threats make it difficult to anticipate and prepare for all possible scenarios. Therefore, adopting a flexible and adaptive approach to cyber-policy and infrastructure development is essential.

One way to approach this challenge is to build resilient systems that can withstand and recover from cyber-attacks. This involves developing and implementing security measures like firewalls, intrusion detection systems, and encryption technologies. It also requires continuous monitoring and testing of these systems to ensure their effectiveness.

Another critical aspect of cyber-policy and infrastructure development is collaboration and information sharing. Given the complexity of cyber threats, no single organization or entity can address them alone. Therefore, it is crucial to establish partnerships and networks that facilitate the sharing of information and expertise. This includes partnerships between government agencies, private sector organizations, and academic institutions.

Finally, it is essential to recognize that cyber-policy and infrastructure development is an ongoing process that requires continuous monitoring and adaptation to changing circumstances. This requires a commitment to research and development and investment in training and education to ensure that individuals and organizations have the knowledge and skills to address emerging cyber threats.

In summary, developing cyber policy and infrastructure requires a flexible and adaptive approach to building resilient systems, fostering collaboration and information sharing, and committing to ongoing research and development.

CYSE 200 T Entry #6

1. How do engineers make cyber networks safer?

Engineers make cyber networks safer by implementing various security measures such as firewalls, intrusion detection systems, encryption, and access controls. They also conduct regular vulnerability assessments and penetration testing to identify and address potential weaknesses in the network. Additionally, engineers stay up-to-date with the latest security threats and trends to protect their networks against emerging threats.

In addition, engineers can also make cyber networks safer by implementing multi-factor authentication, user training and awareness programs, and network segmentation. Multi-factor authentication adds an extra layer of security to the network by requiring users to provide two or more forms of authentication to access the network. User training and awareness programs help educate individuals about potential security risks and how to avoid them. Network segmentation involves dividing the network into smaller subnetworks, which can help contain the spread of malware and prevent attackers from accessing critical systems and data.

2. What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

The overlap between criminal justice and cybercrime is significant, as cybercrime has become a primary concern for law enforcement agencies worldwide. Cybercrime involves using technology to commit criminal acts, such as hacking, identity theft, and online fraud. This type of crime can be challenging to investigate and prosecute, as it often involves perpetrators located in different countries and using sophisticated techniques to cover their tracks.

The overlap between criminal justice and cybercrime relates to the other disciplines discussed in this class, such as computer science, criminology, and psychology. Computer science is essential in understanding the technical aspects of cybercrime, while criminology helps to understand the motivations and behaviors of cyber criminals. Psychology is also relevant, as it can shed light on the psychological factors that drive individuals to engage in cybercrime.

Overall, the overlap between criminal justice and cybercrime highlights the need for interdisciplinary approaches to addressing this complex issue. By bringing together experts from different fields, we can develop more effective strategies for preventing and combating cybercrime and ensure that those who engage in these activities are held accountable for their actions.