{"id":286,"date":"2023-09-18T03:31:00","date_gmt":"2023-09-18T03:31:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/poppoaep\/?page_id=286"},"modified":"2023-12-11T06:29:37","modified_gmt":"2023-12-11T06:29:37","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/poppoaep\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Journal Entries:<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">JE1:<\/h3>\n\n\n\n<p>&#8220;Review the NICE Workforce Framework. Are there certain areas that<br>you would want to focus your career on? Explain which areas would<br>appeal the most to you and which would appeal the least.&#8221;<\/p>\n\n\n\n<p>The areas I&#8217;m interested in are Cyber Defense Analysis, Digital Forensics, Vulnerability Assessment, and Management. These appeal to me the most because their descriptions feel like something I could be interested in. For example, the Cyber Defense Analysis description mentions how you pull information from various sources and defensive measures to analyze and report on events that could or have occurred on the network. Another example would be Digital Forensics and using it to find data, information, and other computer-related evidence in support of network vulnerability mitigation, counterintelligence, fraud, or law enforcement. I remember having to recover data for some family before and the process to learn how things work and how data isn&#8217;t as gone as we think it is.<br><br>An area I am not interested in is software development. To be frank, programming isn&#8217;t my cup of tea. I only use it when my project would be in need of it but unless it&#8217;s something fun and practical for me and my projects, I can&#8217;t imagine myself programming for my career unless needed.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">JE2:<\/h3>\n\n\n\n<p>&#8220;Explain how the principles of science relate to cybersecurity&#8221;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">JE3:<\/h3>\n\n\n\n<p>&#8220;Visit PrivacyRights.org to see the types of publicly available information<br>about data breaches. How might researchers use this information to<br>study breaches? Enter a paragraph in your journal.&#8221;<\/p>\n\n\n\n<p>I believe that Researchers can use this information to understand common traits between breaches and to archive and preserve old data breaches to see how breaches in the past are not exactly different from the ones we have now. On the graph within the website, if you were to search for breaches that involved a physical device, you&#8217;ll notice that out of the top five, four of the breaches were government-related and involved the mishandling of devices. The theft of a laptop, improperly disposed of hard drives, or a lost drive could lead to the potential risk of millions of government-affiliated individuals (Veterans, Employees, etc.) private information. Researchers could use information like these breaches to understand processes such as how hard drives that are not fully destroyed could still have the data inside of them recovered or how in server maintenance, devices could go missing causing the victims to be at risk of physical attacks, identity theft, or be victim of another data breach.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">JE4:<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">JE5:<\/h3>\n\n\n\n<p>&#8220;Review the articles linked with each individual motive.&nbsp; Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).&nbsp; Explain why you rank each motive the way you rank it.&#8221;<\/p>\n\n\n\n<ol>\n<li>Money<br>Money can be a big motivator for many people to commit crimes. With the barrier of entry into cybercrime requiring you to have the knowledge and an internet-connected device, The return of profit from ransomware, bug bounty, or hacking is enough for someone to become a criminal.<\/li>\n\n\n\n<li>Political<br>Hackers with a political motivation for hacking also make sense whether it&#8217;s to attempt to force an entity to listen to their social\/political cause or state-level hacking where they do it for espionage, forensics, or financial. Politics can motivate hackers to break into systems to cause change.<\/li>\n\n\n\n<li>Revenge<br>This is a crime of passion that can motivate someone to hack. If a company fires a former employee, they might attack the company out of revenge for putting them out of a career. They want the organization\/entity to go through bad things, such as DDoS attacks or releasing confidential documents. <\/li>\n\n\n\n<li>Recognition<br>Some hack to gain recognition within the community and to make a name for themselves. Recognition could be good for hackers who also have a business within crime or in profession too.<\/li>\n\n\n\n<li>Boredom<\/li>\n\n\n\n<li>Entertainment<\/li>\n\n\n\n<li>Ego<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">JE6:<\/h3>\n\n\n\n<p>&#8220;Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?&#8221;<br>There weren&#8217;t 3 examples but the 3 prominent fake sites I see and hear about are Discord, Cryptocurrency, and Social media. <\/p>\n\n\n\n<p>Discord: These sites are usually near duplicates of the original site with minor changes such as having text replaced with &#8220;Free Nitro Campaign&#8221;. These sites compared to the original simply just change their domain to make it look reasonably legitimate such as &#8220;nitrogiveaway.com&#8221; or &#8220;discord.nitro.gg&#8221; to help make it look more legitimate. <\/p>\n\n\n\n<p>Social Media: For fake websites in social media, phishing pages could be made to look like legitimate login pages. Each website is different and compared to the original, sometimes they can include spelling errors, and inconsistencies in the layout, or if the website changes its layout, it could be entirely wrong too. A fake Facebook login page could be different from a real one because it could be missing a few things such as the logo, incorrect colors, or change in looks that could tell you it&#8217;s fake. <\/p>\n\n\n\n<p>Cryptocurrency: Cryptocurrency is an area that is full of scams. Fraudsters attempt to scam people by using phishing emails and pages that look similar to the original site such as MetaMask, Coinbase, and Crypto.com. As with other fake pages, they usually just copy the original site and change the domain slightly or replace a character with another one that looks similar to it (Punycode URL). <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">JE7:<\/h3>\n\n\n\n<p>&#8220;Review the following ten photos through a cybersecurity human systems integration framework.\u00a0 Create a meme explaining what is going on in the individual\u2019s or individuals\u2019 mind(s).&#8221;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">JE8:<\/h3>\n\n\n\n<p>&#8220;After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity&#8221;<br>I believe that the media can make our understanding of cybersecurity skewed or misunderstood as they portray or use hacking as a device to solve technological needs when in reality, it can be a bit more complicated. Similar to how shows would use &#8220;enhance&#8221; to see blurry pictures as clear. Hacking is used in a way to solve plot inconveniences and I believe the only show I can think of that portrays hacking in a much more grounded way is Mr. Robot. The hacks and methods they use are definitely more realistic and grounded such as using a rubber ducky to exfiltrate data or using vulnerabilities and zero-days to attack systems. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">JE9:<\/h3>\n\n\n\n<p>&#8220;Complete the Social Media Disorder <a href=\"https:\/\/www.brieftherapyconference.com\/download\/handouts\/Tobi-Goldfus-Social-Media-Disorder-Scale.pdf\">scale<\/a>.\u00a0 How did you score?\u00a0 What do you think about the items in the scale?\u00a0 Why do you think that different patterns are found across the world?&#8221;<br>I only scored 1\/9 (Displacement). I think the items on the scale don&#8217;t relate to me directly but I know others who they do relate to that make more sense to me. I believe that social media can be replaced with internet as I don&#8217;t know anyone who is on social media that much compared to just being on the internet.<br>I believe that in other parts of the world, the pattern will be different such as in Asia where hermits (hikikomori) spend all of their time sheltered in their homes or gaming\/internet cafes. For those who are hikikomori and also use the internet, perhaps they will get a different score because they have a different lifestyle. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">JE10:<\/h3>\n\n\n\n<p>&#8220;Watch this video.\u00a0 As you watch the video <a href=\"https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0\">https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0<\/a>, think about how the description of the cybersecurity analyst job relates to social behaviors.\u00a0 Write a paragraph describing social themes that arise in the presentation.&#8221;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">JE11:<\/h3>\n\n\n\n<p>&#8220;A later module addresses cybersecurity policy through a social science framework.\u00a0 At this point, attention can be drawn to one type of policy, known as bug bounty policies.\u00a0 These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article <a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true<\/a>\u00a0 and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.\u00a0&#8220;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">JE12:<\/h3>\n\n\n\n<p>&#8220;<a href=\"https:\/\/www.youtube.com\/watch?v=Pf-JnQfAEew\">Digital Forensics | Davin Teo | TEDxHongKongSalon \u2013 YouTube<\/a> Watch this video and think about how the career of digital forensics investigators relate to the social sciences.\u00a0 Write a journal entry describing what you think about the speaker\u2019s pathway to his career.&#8221;<br>I think its interesting how he go to that pathway. He was first an accountant that moved into digital forensics that I find the most interesting. A lot of people I know who are within IT or digital security don&#8217;t always come from those backgrounds but something like art, teaching, medical science, etc. My sister graduated from college with a degree in medical science but now she does IT which shows that anyone can get into the tech field even if they didn&#8217;t have that as their background. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Article Review 1:<\/h3>\n\n\n\n<p>The article I am reviewing today is titled \u201cUnderstanding the Use of Artificial Intelligence in Cybercrime.\u201d The article I\u2019m reviewing takes from 2 other pieces that mention particular case uses of AI for cybercrime. I will be explicitly talking about \u201cVictimization by Deepfake in Metaverse: Building a Practical Management Framework.\u201d Within the past four years, the development and advancement of artificial intelligence and machine learning have started to bleed into our daily lives with the introduction of Chat-GPT, GPT-3 and 4, DALLE, Midjourney, and other similar technologies has brought new changes into our lives. With the creation of Chat-GPT, we are able to learn, engage, and interact with the internet via upgraded GPT-powered chatbots, expanded search inquiries, and programming help and advice from AI. Chat-GPT specifically, allows you to create snippets of code through prompts, and even create scripts to read. The issue with this is similar to a double-edged sword. An easy-to-access tool that could help you create code snippets and write scripts could also be used to create malware and make more believable text to help aid in a threat actor\u2019s phishing campaign. This allows phishing and spam emails to be more believable to the untrained eye, more malware produced more campaigns to be created and executed, and extortion evidence to be fabricated or edited with AI, causing more issues for everyday people in our society.&nbsp;<\/p>\n\n\n\n<p>The article\u2019s hypothesis about identifying the use of illicit deep fakes can potentially contribute to cybercrime victimization. Deepfakes are a common example of AI being used for the purpose of monetary or selfish gains. Threat actors could take someone\u2019s face, voice, and a source video to create DeepFake pornography to extort people who have never created pornography and be used to sexually harass people who never consented during this process. Threat actors could target anyone whether it\u2019s for monetary gain. Money doesn\u2019t need to be a motivator for criminals and it could be done out of boredom, revenge, or for social power gain. The challenge with this type of crime is that it could be hard to pull from the internet, it\u2019s easily producible, and unless no one except yourself has pictures of your face, it could happen to anyone.<\/p>\n\n\n\n<p>The article only reached out to 5 expert testimonies from South Korea and I believe that they could improve upon that a little more. I felt that they should have looked for sexual harassment victims from this area to see what they think of this and ways they could have better protected themselves from something like this. They also could have expanded this and asked people of interest who have also fallen victim to this to see what they think.<\/p>\n\n\n\n<p>Sources:<\/p>\n\n\n\n<p><a href=\"https:\/\/vc.bridgew.edu\/ijcic\/vol6\/iss2\/1\/\">https:\/\/vc.bridgew.edu\/ijcic\/vol6\/iss2\/1\/<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Article Review 2:<\/h3>\n\n\n\n<p>To continue with the theme from my last article review about AI and Deepfakes, I will be continuing this topic in this review. I recently read an article about the human ability to detect deepfakes and I found it an interesting topic to write about.<\/p>\n\n\n\n<p>The article Introduces the user to the concept of what a Deepfake is. If you don\u2019t know, a Deepfake is an entity or media created by complex algorithms computation to create synthetic media. This media can take the form of lip-syncs, face-swaps, or head puppetry. The article next mentions one example of a deepfake is the \u201cstyle transfer\u201d which uses machine learning to take a large data set (e.g. human selfies, portraits, faces) and use it to generate its human face from this data set. Now, to the meat and bones of this article, testing the human ability to detect deepfakes of the human face. The researchers in the article mentioned that their methodology of collecting 280 participants and asking them to judge images with an incentive of 6GBP\/hr with an incentive to earn more if they were their performance was in the top 50%. The overall results were that the participants were 62.8% accurate on what was a deepfake and what was not. Now you may be wondering, \u201cWhat influenced this decision?\u201d One of the influences was the \u201cimpossible backgrounds\u201d and another was \u201cAccessories Don\u2019t Make Sense\u201d or \u201cAsymmetric Earring.\u201d The article concludes that while people are still good at being able to detect deepfakes, this still doesn\u2019t get rid of the glaring issue of these AI-generated faces being used in places such as social media or dating apps to take advantage of people who couldn\u2019t detect them.<\/p>\n\n\n\n<p>As for my thoughts: I have known about deepfakes since around 2017 via the emerging use of them for pornography and at the time, they weren\u2019t hard to tell when a deepfake was used to botch a video. At the time, this technology was new and different from other face-swapping technology. It was an interesting piece of technology to me but it felt like it wouldn\u2019t have its uses today. Over the years, I have seen this technology develop more and more creating more realistic results that made it difficult to tell whether the video was real or fake. Fast-forward to today AI has improved to make this technology look really convincing that it was even used for political, social, financial, and political attacks.<\/p>\n\n\n\n<p>Could you imagine a threat actor creating a fake identity through a synthetic face and voice to scam you? That\u2019s very scary to me as this makes the motivation for those to harm be confirmed as the tools are now easily accessible and allow them to hide their tracks even better. Do you know the worst part about that? This has happened before as threat actors used a CEO\u2019s voice to scam them out of $230k+. This means that our security now needs to be planned around knowing who you are, what you have, and what you know in order to prevent situations like this.<\/p>\n\n\n\n<p>It surprised me that the participants were accurate as to me, there was always an uncanny valley with AI-generated pictures, especially with faces. I guess because I have seen this technology before, I have adjusted to it and made sure that what I\u2019m seeing is real or synthetic. A video I watched mentioned that the AI we see today is the worst it\u2019ll ever be and I couldn\u2019t agree more. The videos I saw in 2017 will be the worst I have ever seen of this technology as over time I have watched it improve to the point where it\u2019s extremely difficult to tell if the video is real or fake. I have to question myself \u201cHow likely is this video real?\u201d This throws me back to the \u201cNot everything you see on the internet is real\u201d days, because back then most I had to fear was someone lying to me, now people can fabricate entire personalities and identities through easily<\/p>\n\n\n\n<p>accessible tools. I fear the future of AI and its emerging uses in our world. This technology is one not to be messed with and as it improves, it only improves for the worse or better. In conclusion, I welcome our Robotic Overlords with open arms. Thank you and have a nice day.<\/p>\n\n\n\n<p>Articles:<\/p>\n\n\n\n<p>&#8220;A Voice Deepfake Was Used To Scam A CEO Out Of $243,000 Testing human ability to detect \u2018deepfake\u2019 images of human faces&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal Entries: JE1: &#8220;Review the NICE Workforce Framework. Are there certain areas thatyou would want to focus your career on? Explain which areas wouldappeal the most to you and which would appeal the least.&#8221; The areas I&#8217;m interested in are Cyber Defense Analysis, Digital Forensics, Vulnerability Assessment, and Management. These appeal to me the most&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/poppoaep\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":24864,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/poppoaep\/wp-json\/wp\/v2\/pages\/286"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/poppoaep\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/poppoaep\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/poppoaep\/wp-json\/wp\/v2\/users\/24864"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/poppoaep\/wp-json\/wp\/v2\/comments?post=286"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/poppoaep\/wp-json\/wp\/v2\/pages\/286\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/poppoaep\/wp-json\/wp\/v2\/pages\/286\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/poppoaep\/wp-json\/wp\/v2\/media?parent=286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}