{"id":186,"date":"2025-04-23T07:31:28","date_gmt":"2025-04-23T07:31:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/pjosecyse201s\/?page_id=186"},"modified":"2025-04-23T08:26:23","modified_gmt":"2025-04-23T08:26:23","slug":"journal-entries","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/pjosecyse201s\/cyse-201s\/journal-entries\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<p>These are all of my completed journal entries for the CYSE 201S class.<\/p>\n\n\n\n<ol>\n<li>Review the NICE Workforce Framework. Are there certain areas that you\u00a0would want to focus your career on? Explain which areas would appeal\u00a0the most to you and which would appeal the least\n<ul>\n<li>The role I would love to take in the cybersecurity field would have to be Program Management, the role responsible for leading coordinating, and the overall success of a defined program, through communicating and ensuring alignment with the agency priorities. I believe that this field fits me because I like communication between others and being a strategic standpoint for any team and program. This role seems to have a lot of responsibilities, much like any important role it sets the boundaries for a good program or company. It also allows me to contribute to the success of critical cybersecurity initiatives by overseeing their implementation and progress. I aspire to create a environment where security protects and lets innovation thrive.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li> Explain how the principles of science [Empiricism, Determinism, Parsimony, Objectivity etc.,] relate to cybersecurity?\n<ul>\n<li>Empiricism, determinism, parsimony, objectivity, falsifiability, and replication are crucial to cybersecurity. Empiricism emphasizes learning from real-world data, such as threat intelligence and incident logs, to improve security measures. Determinism highlights how specific actions, like exploiting vulnerabilities, lead to predictable outcomes, allowing for proactive defenses. Parsimony gives simple, effective security solutions to avoid unnecessary complex ones. Objectivity ensures decisions are based on facts and data, removing bias from security assessments and responses. Falsifiability encourages testing hypotheses and refining strategies based on results, ensuring the effectiveness of security measures. Finally, replication ensures that security solutions are scalable and consistently effective across different systems and environments. Together, these principles guide the development of robust, evidence- based, and efficient cybersecurity practices.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>N\/A<\/li>\n\n\n\n<li>N\/A<\/li>\n\n\n\n<li>N\/A<\/li>\n\n\n\n<li>N\/A<\/li>\n\n\n\n<li>Review the following photos through a human-centered cybersecurity framework.\u00a0Create a meme for your favorite three,\u00a0explaining what is going on in the individual\u2019s or individuals\u2019 mind(s)\n<ul>\n<li><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"416\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXcPlZpKdzmpvv5uXLCUJp-WwP-xFuFVCoqn_vlpGLXVDe70dMALyDABPuf5HIuimMToj-NFojyFs9NKkhAG1w5XUpffYMyF3U9EOjkkgvSdDmajwCseWNGhsuNTzmUi8_YXgbWwvA?key=I8Fb_XyFQ32ltMg-AJjfJ6Pt\"><\/li>\n\n\n\n<li>This meme is a play on when a cybersecurity team stops hackers from extracting data from their companies servers. You can see the men are extremely happy, jumping in the air in excitement, maybe from a possible raise after the cyber attack or just from a long day of work and finally defeating the hacker and stopping them from threatening the company any more.<\/li>\n\n\n\n<li><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"416\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXdjPsDDp0TH1uzid06f2__DqFXoP9D3z48Tw9UOUZVjWC15Y8Ibt7WvIIOhy1U2Gs1pvaGLO7QH3y3QYyD---MnGDB0XtuRt2H8JyoTqQzyhHFwTWcBBhQb7Rg98eUWLEhfo_UnDg?key=I8Fb_XyFQ32ltMg-AJjfJ6Pt\"><\/li>\n\n\n\n<li>I used this photo simply to symbolize someone logging onto their computer to remotely counter attack a handful of cybersecurity problems a company may have one at a time at a good pace, all in a days time of work.<\/li>\n\n\n\n<li><img decoding=\"async\" width=\"624.0320641282565\" height=\"395\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXcuWij7OjojU8kmUp3bI5NiGUmSjOltOIAwLuHC-HH2frr_-PWyqUDK1Ma9B6HTFk4LZGwhRCqWp-SQ8tzaL2Rm3c7Sk7REcsSF1smW8VdUN1c6IkmiHdkjwL1vDDPKGHpu1veWmg?key=I8Fb_XyFQ32ltMg-AJjfJ6Pt\"><\/li>\n\n\n\n<li>I used this photo to represent a head of a company&#8217;s cybersecurity branch presenting a new program to the team, showing them how to use it to stop hackers and cyber-attacks in the future.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Watch this video and pay attention to the way that movies distort hackers.<a href=\"https:\/\/www.youtube.com\/watch?app=desktop&amp;v=6BqpU4V0Ypk\" target=\"_blank\" rel=\"noreferrer noopener\">Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? &#8211; YouTube<\/a>\n<ul>\n<li>While watching this YouTube video, I can deduce that these shows and movies shown take regular cyberworld practices and almost use them as background of the main story, while exaggerating them to be much smaller pieces of film. In the show &#8220;MR. ROBOT&#8221; season 3 episode 1, the hacker Elliot advises the person in the CTF (Capture the Flag) how to win the challenge without previously knowing what&#8217;s going on. I also find it funny that Keren Elazari confirms that although what he was doing on the computer (Hacking a registrar) was very realistic, it would take much longer to do. I point this out to introduce the idea that someone might see this film, decide to try this out as a means of a &#8220;hobby&#8221; when they shouldn&#8217;t be. Not only are they trying something illegal, but the process of hacking a registrar could take hours maybe days depending on how many cybersecurity measures are set in place.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>N\/A<\/li>\n\n\n\n<li>Read this and write a journal entry summarizing your response to the article on social cybersecurity:\u00a0<a href=\"https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b.<\/a>\n<ul>\n<li>Cybersecurity has never been limited to data security; it also includes the defense of populations against misinformation and psychological attacks. Governments and organizations use cyber tools to influence public opinion, spread misinformation, and harm the nation as a whole. Social media allowed the spread of misleading narratives, impacting views on politics and public trust.\u00a0With information now decentralized, individuals must critically evaluate news sources and recognize potential manipulation. While governments and tech companies try to combat misinformation, there is a fine line between regulation and free speech. To address these challenges, cybersecurity strategies must include public awareness and media literacy programs.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Watch this video As you watch the video: <a href=\"https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0.<\/a><a href=\"https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0\"><\/a>, think about how the description of the cybersecurity analyst job relates to social behaviors.\u00a0 Write a paragraph describing social themes that arise in the presentation.\n<ul>\n<li>The cybersecurity analyst job poses a good number of social themes, like understanding human psychology. Analysts have to understand how attackers exploit people through methods like phishing and baiting. They also have to monitor their companies&#8217; servers 24\/7 for any irregularities in the system to report to their company. They also have to be aware of social patterns and track things like fake news and social media scams to predict and mitigate threats. which leads me to my last instance, social media, which is a common place for attacks like identity theft and misinformation. Analysts have to monitor these trends and behaviors to be able to counteract them.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Read this\u00a0<a href=\"https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf<\/a>\u00a0sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter.\n<ul>\n<li>The two social science theories that I think pertain the most to this instance are the Neutralization theory and the social contract theory, these are shown by how the attackers tried to void guilt by rationalizing their actions and how the customers trust companies to safeguard their personal information. some economic theories that I thought of were gordon-leobs model and the economic lose doctrine, showing a framework where cybersecurity was inefficient or nonexistent while also finding it hard for the customers to find any sort of compensation for the financial damage or loss of their data. These theories prove themselves in the instance of the article given.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>N\/A<\/li>\n\n\n\n<li><a href=\"https:\/\/clario.co\/blog\/illegal-things-you-do-online\" target=\"_blank\" rel=\"noreferrer noopener\">Andriy Slynchuk.<\/a> has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.\n<ul>\n<li>After reading Slynchuk\u2019s article, I think the five most serious online violations are downloading copyrighted content, using someone else&#8217;s Wi-Fi, cyberbullying, accessing the dark web, and sharing passwords on streaming websites. Downloading movies or music online seems harmless, but it\u2019s actually very illegal and can lead to a lot of fines.\u00a0I&#8217;ve found that using someone\u2019s Wi-Fi without permission is also stealing, even if it\u2019s just for a short amount of time. Cyberbullying is especially bad because it can deeply hurt people. Accessing the dark web might seem like exploring, but it\u2019s risky and can expose you to illegal or dangerous things that you never wanted to find.\u00a0Lastly, sharing streaming service passwords may seem common, but it goes against terms of use and could be considered fraud. I&#8217;ve always thought it was normal to do this but i&#8217;ve been proved very wrong. These actions are more serious, because they can cause real harm or have legal consequences.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>These are all of my completed journal entries for the CYSE 201S class.<\/p>\n","protected":false},"author":30657,"featured_media":0,"parent":201,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pjosecyse201s\/wp-json\/wp\/v2\/pages\/186"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pjosecyse201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pjosecyse201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pjosecyse201s\/wp-json\/wp\/v2\/users\/30657"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pjosecyse201s\/wp-json\/wp\/v2\/comments?post=186"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/pjosecyse201s\/wp-json\/wp\/v2\/pages\/186\/revisions"}],"predecessor-version":[{"id":187,"href":"https:\/\/sites.wp.odu.edu\/pjosecyse201s\/wp-json\/wp\/v2\/pages\/186\/revisions\/187"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pjosecyse201s\/wp-json\/wp\/v2\/pages\/201"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pjosecyse201s\/wp-json\/wp\/v2\/media?parent=186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}