Final ePortfolio

Journal Entrys’

Journal entry 1

The area I would want o focus my career on is Operate and Maintain. More specifically System Administration, that area appeals to me the most. Working with computers has been a passion of mine since I was a teenager. Technology is constantly changing and evolving, and knowing that there is a solution to system errors can be extremely rewarding. I enjoy working with intelligent, like-minded people from different cultures and backgrounds. My professional growth potential is limited only by my motivation, so I’m looking forward to seeing where this job takes me. Although I can always work from home in this job, I prefer being in the office. The salary is good, so you have great space for professional development and can live a fairly comfortable life in this field of career. 

The area of specialty that appeals the least for me is Knowledge Management. The biggest challenge in knowledge management is resistance to sharing. In many organizations, knowledge is power. There is a real risk of information overload, where important insights get buried under mountains of data, making it difficult for employees to quickly find the knowledge they need. While explicit knowledge is relatively easy to document, tacit knowledge (the insights, experience, and intuition that employees gain over time) is much more difficult to capture. This type of knowledge is highly personal and often context-specific, making it difficult to codify and share.

Journal entry 2

Cybersecurity as a social science requires adherence to scientific principles such as relativism, objectivity, parsimony, ethical neutrality, and determinism. Technology is bringing attention to how interconnected everything is, and relativism says that this is changing social systems. Uniformity and objectivity are necessary for conducting research. A simple scientific theory is suggested by parsimony, but because social structures and human nature are complex, it is challenging to use a single theory to explain all crimes. Observation and measurement-based knowledge, as opposed to faith or opinion-based knowledge, are highly valued in empiricism. Determinism maintains that there is an influence between actions and outcomes, similar to relativism, but that a cause-and-effect relationship is not evident. The ethical neutrality norms are those that researchers adhere to when working with subjects.

Journal entry 3

This website provides a wealth of information about different laws, including privacy laws. To verify accuracy and understand the variations in each state’s policies, the data can be viewed by state. A tonne of statistics and data about prior data breaches that have happened in the past years are also available on this website. Researchers can develop future action plans with assistance from the documentation of past studies and cyber incidents. Researchers can learn how to handle situations or not handle situations by knowing how past breaches occurred. Researchers can learn the correct way to perform a study on a data breach by studying the research and studies that have already been done. Additionally, a lot of advice is provided on the website in an effort to inform visitors on ways to lessen the chance of breaches. In general, a researcher can learn more about breaches more effectively with the help of this website.

Journal entry 4

A system of rankings called Maslow’s Hierarchy of Needs classifies the various needs that people try to fulfill in their lives. An identical structure can be used to illustrate the various ways in which technology affects people’s lives. I’ve included a list of my tech experiences for each tier below.

Physiological Needs – I have been mentally frustrated, anxious, and uneasy as a result of losing track of my cell device several times.

Safety Needs – Back in my youth, there was an attempt made by someone else to gain access to one of my accounts through compromised passwords. During this period, I was concerned for my personal safety.

Belongingness & love needs – My spouse and I can communicate more effectively thanks to technology. Making a plan to enable me to interact with the people in my life more deeply.

Esteem needs – The emergence of social media began to affect my self-perception. This had a beneficial as well as detrimental impact on my sense of self-worth. Fretting about my shortage of supporters or the number of likes I received on a picture.

Self-actualization – I was able to pursue a lot of enjoyable activities through the use of technology. Playing games on the computer gave me the opportunity to interact with new acquaintances and partake in something I enjoyed. I was also able to pick up new skills more quickly because of modern technology. Eventually enabling me to carry out the assignments or activities I desired.

Journal entry 5

Entertainment (rank 6) – Since it appears more probable in my mind that an individual would want to benefit financially from a cyberattack. Gaining more experience would be the primary activity individuals would engage in for fulfillment.

Political (rank 5) – In my opinion, it is the most specialized motive of all. Although a political motivation can exist outside of government agency politics as a whole, I believe that most people who act with a political motivation are not your typical citizens. In my opinion, more seasoned hackers are the ones who take actions motivated by political agendas.

Revenge (rank 4) – Any individual has experienced some sort of misconduct. This could be an infraction of little consequence or something much more serious. A sense of retribution or deed of revenge is what it’s known for. Following up on that, people tend to make decisions more on sentiments than on rational thought.

Boredom (rank 7) – This one makes very little logical sense among the various other motivations on this list of reasons. Despite the fact that an individual engaging in a criminal act for the reason they have grown disinterested, I believe this is not the most probable scenario among the examples on this list of possibilities.

Recognition (rank 2) – Any individual aspires to have themselves reestablished for a particular skill or field of expertise. Consequently, a lot of hackers connect with networks in order to establish an impression or receive recognition for what they have accomplished. In general, a lot of hackers are okay with using a fake identity but want to keep themselves hidden especially when it comes to confidential data.

For Money (rank 3) – Any individual aspires to greater wealth. For the sake of earning a greater sum of money, it drives people to participate in numerous offenses or venture to great lengths.

Multiple reasons (rank 1) – A particular individual is a greater probability to behave out of several motivations instead of just a suitable one. Money could serve as the driving force behind a certain individual, nonetheless they might additionally harbor a secret desire for acknowledgment. Furthermore, they ought to consider it amusing to exact retribution upon an individual.

Journal entry 6

False websites frequently don’t use the entirety of the screen or enhance the webpage in an effort to grab the viewer’s curiosity. They often have a lot of advertisements that reduce user productivity and can look like email newsletters. These websites don’t have an accurate screen layout and frequently resemble newsletters, which makes it challenging for users to deal with properly.

The websites I visited disseminated false information while trying to pass it off as authentic by enticing visitors to provide or acknowledge up for a particular thing.

Fake website 1: http://www.thedogisland.com/
Fake website 2: https://zapatopi.net/treeoctopus/
Fake website 3: http://www.dhmo.org/

Journal entry 7

Meme #1 – “Free public Wi-fi, YES!”

https://unsplash.com/photos/ICTKcvnXx_8

The social connection to the system structure highlights how crucial it is to inform people about the dangers of doing certain things, especially while utilizing public Wi-Fi networks. Making sure that network-connected gadgets are inaccessible to other network users emphasizes the necessity of human system integration in order to shield prospective employees from malevolent attackers on the internet.

Meme #2 – “When dogs have no clue about internet”

https://unsplash.com/photos/gySMaocSdqs

Although anybody may use the internet safely, kids and teenagers are especially at risk. Social media posts that may come back to bother them later in life and cyber predators are only two examples of the serious consequences that can arise from online threats. By unintentionally installing malware that might provide hackers access to private data, children run the risk of exposing their families to online hazards. Awareness, knowledge of potential risks, and open communication with parents are all necessary for protecting children online. Certain dangers can be mitigated with the use of cyber security software.

Meme #3 – “Content for the unknown viewer”

https://commons.wikimedia.org/wiki/File:CellPhone_(16491636068).jpg

Although social media can be a lucrative source of income, one must exercise caution when using it. Steer clear of using your real name or providing any means by which others could obtain your information. Even if something is private, don’t share personal images or videos or personal information. Don’t share private information on social media, such as your birthdate or city, and keep your personal accounts private. Even though the replies you get might not be as bad as you first imagined, exercise caution.

Journal entry 8

The skills of hackers are frequently distorted in movies, emphasizing their quickness and aptitude for breaking into things or deciphering code. They fabricate objects that aren’t real to create the illusion that hackers are that powerful. It appears that competent hackers can easily access anything they want, which promotes the idea that no one is truly secure online. This distorts the perception that no one is truly safe or secure online.

Journal entry 9

On the social media disorder scale, I answered “yes” to six out of nine questions. I believe that some of the scale’s questions are rather general, which, depending on whether it pertains to you, may cause some misunderstandings. In my opinion, the domains that the scale aims to investigate are useful in identifying whether an individual is suffering from a disorder. Access to the internet is the reason for the variations in patterns observed globally. Demonstrating further how access levels and phone ownership can be determined by societal norms. Younger children in the United States have access to social media and phones, while children in many other nations do not enjoy this luxury.

Journal entry 10

The significance of social cybersecurity has grown over the last ten years as a result of technology turning conventional kinetic conflicts into cyberwars. This shift has made information more widely available and increased access to a wider range of sources feasible. Due to the ability of adversaries to spread false information and transgress moral standards, social cyber security must be respected nationally. One way to win a war is to socially demolish the opposition city and inspire the people to rebel against the government or ruling class. Social cyber security is essential for preventing oppositions from interacting on a large scale within society.

Journal entry 11

A cybersecurity analyst may be responsible for a variety of duties and tasks, depending on the particular workplace. Since phishing and other socially engineered attacks on the network were covered in a large portion of the video, it is imperative to the work that one has an understanding of other people’s social behaviors. Not to mention, hackers constantly look for gaps and vulnerabilities when targeting computers and networks. Each organization has its own uniqueness because of the individual members. In the video, the role was also mentioned in addition to training and education. Becoming acquainted with people is crucial to preserving network security because these are social exchanges.

Journal entry 12

The Laissez-fare economics theory is one economic theory that is relevant to this letter. According to this theory, governments shouldn’t become involved in the economy unless it’s necessary to safeguard citizens. In this instance, the government is getting engaged to safeguard the users whose information might have been stolen. The Cost/Benefit Analysis is a second economics theory that is relevant to this correspondence. This is done to calculate the benefits and costs of informing the users that a compromise was made. This study is also carried out to ascertain which decisions are best for an individual or a company. One social science theory that is utilized to decide what to do in a given situation is the rational choice theory. To ascertain which decisions would yield the optimal result in the long run. The individual getting the information also applies this idea to decide how best to react or behave, aware that their information is in danger. Additionally relevant to this letter is the deterrence theory. It seems worthwhile to the entity that committed the crime to carry it out. Concluding that the penalties for being discovered are insufficiently severe. The individual is not deterred as a result. If someone is found to have committed a crime, the government should ultimately impose tougher laws or sentences. Given that people wouldn’t want to face such a sentence, there would be less criminal activity as a consequence.

Journal entry 13

It should come as no surprise that bug bounties are a useful tool for implementing better secure network policies. All things considered, a business will typically experience a cyber breach or hacking at some point. Cybersecurity is typically a field that is developed in response to an event. One way that the field of cybersecurity has been able to stay ahead of the curve in terms of bug bounty setup. Both the business and the hackers profit from bug bounties. A bug bounty program not only informs a corporation about its cybersecurity vulnerabilities but also gives hackers a means of earning money or recognition.

Journal entry 14

Andriy Slynchuk discusses 11 criminal activities by internet users. In my perspective, the five most important infractions are 11, 9, 8, 7, and 5 from the image. unlawful internet searches are significant because the items that are unlawful to seek on the internet are so for a reason. It is possible to be concerned if someone is attempting to look up such stuff. Another significant infraction is gathering information about youngsters. Gather information about children under the age of 13 in accordance with the Children’s Protection Act. Moreover, children may be exposed to things that they shouldn’t be, which makes this detrimental. Utilizing the intent networks of others is a significant concern as well, since it can trace back to your internet network if someone uses your private network to look for or investigate unlawful content online. The individual whose internet network is being used has cause for concern over this. Online identity theft is a problem as well because, if the information used is someone else’s, it may be categorized as identity fraud. If it believes the user is older, there may also be a problem with the content that is displayed to them. Because it can have consequences in real life, cyberbullying and trolling are serious problems. Cyberbullying can result in self-harm or adverse consequences for the victim.

Journal entry 15

My curiosity was sparked by Davin Teo’s TED talk on digital forensics, since these investigators use electronic gadgets, data analysis, and digital evidence tools to solve crimes, necessitating a thorough comprehension of behavioral, social, and psychological factors. Davin Teo talks about his path into digital forensics, which began with his career as an accountant and eventually led him to computer science. He analyzes data in secret cases like bank accounts and threats to the IT department using his knowledge of human behavior and social science competence. Teo stresses the value of maintaining a low profile in one’s professional life and the influence of research and social structure knowledge. By showcasing the possibilities for passion in atypical sectors, Mr. Teo’s journey in the field of digital forensics highlights the significance of technical capabilities and social science understanding for a successful career.

Career professional paper

Article 1 & 2 reviews