CYSE 201S

Using a social science lens, this course explores cybersecurity’s societal, financial, legal, and political facets. The course also looks at how researchers in those fields study cybersecurity. The assignment that stands out to me the most in this course is the career papers we wrote. For our career paper, we were asked to pick a career in the cybersecurity field and talk about how such professionals rely on social science studies and concepts in their work. For my paper, I decided to discuss the position of a penetration tester.

In this assignment, I had the opportunity to improve my research and critical thinking skills. This fits in well with the focus of my ePortfolio on developing a thorough grasp of cybersecurity concepts and how to apply them to creating a safe cyberspace. Through extensive research, this assignment gave me the ability to assess, gather, and analyze information effectively. My understanding of critical thinking and analysis improved as I explored how social science concepts relate to the work of penetration testers. On a professional level, what I’ve gained from this paper, will help me approach future issues that are related to cybersecurity from a comprehensive perspective. Also, taking into account not only the technical components but also the sociological aspects as well. 

I have many other artifacts from this course. I have my article review paper and journal entries. For the article review, we were asked to essentially write a piece on a scholarly cybersecurity article and how it related to social science. We were also asked to analyze the article’s research methods and questions. With the journal entries we were asked to answer questions that correlate to social science and cybersecurity. These are both included on this page.

  1. Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least

I would like my career to focus on the investigative area, which consists of digital forensics and cyber investigation as noted in the Workforce Framework for Cybersecurity(NICE Framework). I find it fascinating what takes place during the investigation of any crime. The area that appeals to me the least is the operate and maintain category. Which has more to do with networking and system administration. Which just simply doesn’t interest me very much, I am intrigued in the process of investigating and examining evidence in a cybercrime.

https://niccs.cisa.gov/workforce-development/nice-framework#:~:text=The%20NICE%20Framework%20is%20comprised%20of%20the%20following,required%20to%20perform%20tasks%20in%20a%20Work%20Role

2. Explain how the principles of science relate to cybersecurity.

Cybersecurity goes hand in hand with the principles of science. These principles include parsimony, relativism, determinism, etc. According to the principle of parsimony, researchers need to retain their degree of reasoning as straightforward as feasible. Determinism signifies how past experiences have impacted, or affected conduct. Relativism is meant to suggest that everything is connected.

3. Visit PrivacyRights.org to see the types of publicly available information
about data breaches. How might researchers use this information to
study breaches? Enter a paragraph in your journal.

I believe this information can be very valuable for researchers when learning more about data breaches. Researchers may use this information to learn about why data breaches happen and how to prevent them from happening. They may use this information to study breaches in order to possibly be cautious of data breaches in personal use or their businesses. They may also use this information for the purpose of what they can do prevent this from happening to them.

4. Review Maslow’s Hierarchy of Needs and explain how each level
relates to your experiences with technology. Give specific examples of
how your digital experiences relate to each level of need.

Maslow’s Hierarchy of Needs provides a framework for understanding the motivations behind behavior. This is made up of five needs, including self-actualization and self-esteem. psychological requirements, a sense of love and belonging, and security. Since technology has made it possible for me to stay in regular contact with friends and family, I can connect to the yearning for love and belonging. Since I utilize virus protection software to keep everything on my computer secure, I can connect to the concepts of safety and security.

5. Review the articles linked with each individual motive. Rank the
motives from 1 to 7 as the motives that you think make the most sense
(being 1) to the least sense (being 7). Explain why you rank each
motive the way you rank it.

  1. Political

2. For Money

3. Recognition

4. Multiple reasons

5. Entertainment

6. Boredom

7. Revenge
6. Can you spot three fake websites and compare the three fake websites
to three real websites, plus showcase what makes the fake websites
fake?

I can tell it’s a fake website by the web address and URL. There are also grammatical errors and mistakes on the website, and no reviews for it either.

7. Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind.

I chose this image to create a meme of. https://commons.wikimedia.org/wiki/File:Summer_school_GLAM_giorno_1_1.jpg

My meme I created using: https://www.iloveimg.com

8. After watching the video, write a journal entry about how you think
the media influences our understanding about cybersecurity.

Media has created a great number of risks in cybersecurity. Any personal information you have out on social media makes it that much easier for criminals to steal your identity, or even just hack into your personal accounts.

9. Complete the Social Media Disorder scale. How did you score? What
do you think about the items in the scale? Why do you think that
different patterns are found across the world?
My score from the Social Media Disorder scale is 3. I think the items in the scale are critical because I believe social media does have such a negative impact on a person in many different ways.

10. Read this and write a journal entry summarizing your response to the
article on social cybersecurity
https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-
Archives/Mar-Apr-2019/117-Cybersecurity/b/

In this article, we learn how critical it is to demonstrate the dynamics of the current digital world. It is also important to discuss the potential dangers that come with that as well. That we have to strive to advance the space of cybersecurity.


11. Write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.

The use of policies would have worked out better if they had a more thorough understanding and knowledge of bug bounty’s and their markets.

12. Review what the author says and write a paragraph describing the five
most serious violations and why you think those offenses are serious.

  1. Bullying and trolling- I believe this is a serious offense because anyone these days can make a profile and bully someone behind a screen. Bullying and trolling can have serious effects on one’s mental health.

2. Collecting information about children- This is very serious because this information could be used for a majority of reasons.

3. Sharing passwords- This is a serious offense because by sharing passwords and addresses, it makes it easier for a hacker to get ahold of your accounts and personal information.

4. Recording a VOIP call without consent- This is a very serious offense because by recording a call without permission, nowadays anyone can take your voice using AI and pretend to be you in order to trick family and friends into sending them money.

5. Using other people’s internet networks- When other people use your internet network it makes it easier for hackers to gain access to it.

13. Write a journal entry describing what you think about the speaker’s pathway to his career.

I find it very interesting because it shows you do not have to go the “traditonal” route. Even if you have majored in something entirely different or are working in a different field, if you have a keen interest in something you just have to get your foot in the door.