Journal Entry’s

Journal Entry #1

The NICE framework is a foundation for the cybersecurity workforce. There are multiple areas I would want to focus my career on. Mainly the Risk Management factor because I find managing your risk when doing anything is basic for any company to be able to succeed. Another would be Incident response, I chose this one because you need to know what to do so you can maximize profit and minimize risk. As I stated, the one I would appeal to most is Risk Management. The one I would appeal to the least would be Digital Forensics.

Journal entry #2

The principles of science play a crucial role in the field of cybersecurity by providing a systematic and evidence-based approach to understanding, analyzing, and addressing security challenges. It does this by Empirical Observation, Hypothesis Testing, Experimentation, Data-Driven Decision-Making, Continuous Learning and Adaptation, Peer Review and Collaboration, Predictive Modeling, and Ethical Considerations. All of these are strategies you can use to incorporate science into the cybersecurity field. By applying the principles of science, cybersecurity professionals can enhance the effectiveness of security measures, respond to threats with evidence-based strategies, and contribute to the ongoing improvement of cybersecurity practices and technologies.

Journal entry #3

Researchers would use this information to study breaches by looking at the websites’ different databases which talk about a variety of things. The website shows information about the amount of breaches reported in the United States from whatever year, the impacted records, and the organizations with the largest number of reported breach notifications. You can also view each state information as well. The site can help determine what area needs help and how to help it. Researchers can then use this information to see what needs to be done to help the general population by making new antivirus applications. 

Journal Entry #4

The five needs of Maslow’s Hierarchy of Needs are Physiological needs, Safety needs, Love and Belongingness needs, Esteem needs, and lastly Self-Actualization needs. I can apply my experiences with Physiological needs by using doordash to get food which is a Physiological need. I can apply my experiences with Safety needs by equipping my house with security cameras. I can apply my experiences with Love and Belongingness needs by using social media apps like Instagram to stay in touch with people. I can apply my experiences with Esteem needs by using online learning platforms to help me develop needed skills. I can apply my experiences with Self-Actualization needs by using creative software tools like Adobe to make digital art and other creative works.

Journal entry #5

The most sensible one would be for money in my opinion because at least you are getting a profit in return. The second most sensible would be for recognition. I think  that this would be second because you are doing it for a cause. The third would be for multiple reasons because at least they are doing this for at least one good reason. The fourth would have to be revenge. I think this would be fourth because it would be a majority. I think political would be fifth because there is a lot of corruption in that area. The sixth would be entertainment because not a lot of people do it just for fun to pass time. The seventh would be boredom which is self explanatory.

Journal Entry #6
There a lot of fake websites out on the internet like http://www.dhmo.org, http://zapatopi.net/treeoctopus, http://allaboutexplorers.com. These websites could be considered as fake websites by a lot of general means. There are a lot of examples that make a fake website Poor Design and Layout, Unsecured Connection, Suspicious URLs, Lack of Contact Information, and Too Good to Be True Offers. There are more ways a website could be considered fake. For instance, if the sites name is freedesignerbags.com, there is a good chance they are not giving free designer bags to the population.

Journal entry #7

Offering timely feedback and support to users when they encounter security-related issues be like:

Providing comprehensive education and training programs to raise awareness about cybersecurity threats, best practices, and the importance of security measures can empower users to make informed decisions and take proactive steps to protect themselves and their organization:

Implementing adaptive security controls that can adjust their behavior based on user interactions and contextual factors can help strike a balance between security and usability like:

Journal Entry #8

The media significantly influences public perception of cybersecurity, acting as a double-edged sword. On one hand, it raises awareness and educates the public about cybersecurity threats and best practices, potentially driving policy changes for better security measures. On the other, media coverage can sometimes be sensationalized, leading to exaggerated fears or misinformation about threats, and may cause desensitization or an overemphasis on certain types of attacks. This underscores the importance of media literacy, enabling the public to critically evaluate cybersecurity information, distinguishing between sensationalism and valuable insights, and focusing on actionable and accurate advice to enhance personal and organizational security.

Journal Entry #9

I didn’t understand the scoring system but I answered them all and said no to them all. I think that the items in the scale are pretty interesting easy to answer questions that get to the point. I think that different patterns are found across the world because everyone is different and lives in a different situations in life. I also think that different patterns are found across the world because according to the video, people spend different amounts of time on social media and some people are more prone to hacks and/or gullible than other individuals.

Journal Review #10

I read the article “Social Cybersecurity” from Military Review, authored by Lanning and Morotti. It emphasized the crucial role of human behavior and organizational culture in shaping cybersecurity practices. The authors talked about the importance of fostering a cybersecurity-conscious culture and promoting interdisciplinary collaboration to address evolving cyber threats. Their way of thinking stayed with me, prompting a renewed commitment to promoting cybersecurity awareness and resilience within any organization that has prompted so. The article provided practical strategies for enhancing cybersecurity posture, leaving me feeling inspired and motivated to take the steps needed towards and/or hope to secure everyone’s digital future.

Journal entry #11

Social themes in general encompass a wide array of dynamics that intersect with human behavior, organizational culture, and societal norms. Within the cybersecurity analyst job, professionals often grapple with issues related to trust, privacy, and ethical considerations in their daily work. They navigate complex relationships with colleagues, clients, and stakeholders, striving to foster a culture of security awareness and collaboration within their organizations. Moreover, cybersecurity professionals confront the broader societal implications of their work, including the impact of cyber threats on individuals, communities, and global networks. They are tasked with addressing issues of digital inequality, access to resources, and the ethical use of technology in a rapidly evolving digital landscape. By engaging with social themes in their work, cybersecurity analysts play a crucial role in safeguarding digital infrastructures while promoting ethical and responsible practices that uphold the values of trust, integrity, and social responsibility.

Journal Entry #12

My first economic theory would be Information Economics theory because it examines how information is distributed, valued, and utilized in economic transactions. My second would be Economic incentives theory because it plays a crucial role in shaping the behavior of individuals, organizations, and institutions. My first social science theory would be the social identity theory. In the context of the data breach incident, Social Identity Theory can help explain how affected customers may perceive themselves and their relationship with the company. My second social science theory would be the trust theory. The trust theory is a fundamental concept in social science, and various theories explore its nature, formation, and consequences. In the context of the data breach incident, Trust Theory is relevant in understanding the impact of the breach on the trust relationship between customers and the company.

Journal Entry #13

The article “Hacking for Good: Leveraging HackerOne Data to Develop an Economic Model of Bug Bounties” explores the intersection of cybersecurity and economic incentives through the lens of bug bounty programs. It delves into the analysis of data from HackerOne, a leading platform for bug bounty programs, to understand the economic dynamics at play. By leveraging this data, the article may offer insights into how bug bounty programs function, their effectiveness in identifying vulnerabilities, and the economic motivations driving hackers to participate. This approach underscores the importance of incentivizing ethical hacking to bolster cybersecurity efforts.

Journal entry #14

I would say the top five that are serious violations in my opinion are Collecting Information About People Younger Than 13, Bullying and Trolling, Sharing Passwords, Addresses, or Photos of Others, Illegal Searches on the Internet, and Faking Your Identity Online. I think that Collecting Information About People Younger Than 13 is a serious offense because getting information about minors is simply weird. I think that Bullying and Trolling is a serious offense because it has been shown that people will go to drastic measures to make the harassment stop. I think that Sharing Passwords, Addresses, or Photos of Others is a serious offense because those are considered very private information that other people can take advantage of. I think that Illegal Searches on the Internet is a serious offense because the only time google stops you from a search is when it is really bad like bomb-making. I think that Faking Your Identity Online is a serious offense because it could lead someone to believing that you are someone you are not.

Journal entry #15

Digital forensics investigators delve into the intricate web of human behavior and technology, where the digital realm intersects with social dynamics. They employ methodologies rooted in social sciences like psychology, sociology, and criminology to analyze digital evidence and understand the motives, intentions, and actions of individuals involved in cybercrimes. By applying theories of human behavior, they decipher digital footprints, uncover activity patterns, and reconstruct events. Moreover, they contribute to shaping policies and strategies by considering the socio-cultural context of cybercrimes. What I think about the speaker’s pathway is that it was pretty interesting to see how he started.