Journal entry #1

Roles are divided into seven areas by the NICE Workforce Framework for Cybersecurity, including Analyze, Protect and Defend, Investigate, and Oversight and Governance. I am especially drawn to roles in the analyze category, such as threat analysis and all-source analysis, since they call for the application of critical thinking, deep analytical abilities, and problem-solving techniques in order to identify and reduce cybersecurity threats. My drive for diving into complex issues and coming at sensible choices is in line with these positions. Oversight and governance positions, particularly those involving cybersecurity legal advice and advocacy, are less popular. These professions are more policy and compliance-oriented, requiring legal and regulatory work rather than hands-on technological problems, which may not suit my  more dynamic, technical work in cybersecurity. My career goals are best aligned with areas where I can actively participate in technological problem solving and direct danger prevention. Understanding the importance of governance responsibilities, on the other hand, contributes to a well-rounded cybersecurity viewpoint.

Journal Entry #2

Science principles are crucial to cybersecurity, guiding the development and study of security solutions. The scientific method, which includes observation, hypothesis, experimentation, and analysis, serves as the foundation for developing security procedures and solutions. To improve security tactics, researchers investigate prospective attackers, theorize vulnerabilities, test defenses, and analyze findings. Furthermore, computer science basics such as algorithms and data structures are essential for building encryption techniques and intrusion detection systems. Scientific rigor guarantees that cybersecurity solutions are validated for efficacy and robustness, while ongoing research allows for adaptation to evolving threats. Essentially, scientific principles dictate methodical, evidence-based approaches to protecting digital information and systems.

Journal Entry #3

Researchers can examine the frequency and features of data breaches in different industries by using the data on PrivacyRights.org. Scholars can determine which kinds of data are most vulnerable by classifying breaches according to the kind of information disclosed, such as financial information, health records, or personal identity information. They can also look into the typical reasons for breaches, such as insider threats, human error, or cyberattacks. Understanding patterns over time, such as rises in particular attack vectors or newly discovered vulnerabilities, can be gained from this study. Additionally, by knowing how breaches affect impacted people and organizations, better preventative methods and policies may be developed, improving data security procedures all around.

Journal Entry#4

Maslow’s Hierarchy of Needs provides a helpful way to look at how technology meets different human needs:

Physiological Needs: Technology helps meet essential needs such as food and shelter. For example, apps such as DoorDash and Zillow make it really easy to get meals and find housing options.
Safety Needs: Online banking and cybersecurity tools help keep personal information and financial assets safe, creating a feeling of security.
Belongingness and Love: Social media platforms such as Facebook and WhatsApp help me stay connected with friends and family, making sure I feel included in a community.
Esteem Needs: Professional networks such as LinkedIn allow me to display my accomplishments and receive acknowledgment, which enhances my confidence and sense of self-worth.
E-learning platforms like Coursera really help me explore my potential and work on my personal growth by gaining new knowledge.
Technology really connects with what I need, helping me get things done more efficiently and making my daily experiences more meaningful.

Journal Entry #5


Journal Entry #6

Fake websites frequently attempt to replicate authentic ones in order to trick users. Here is a comparison.

Fake: “G00gle.com” (uses the number “0” instead of “o”)
Real name: “Google.com”
Fake Indicator: A misspelled URL and unusual characters.

Fake: “Paypa1-services.com” (replaced “l” with “1”).
Real: “Paypal.com”
Fake Indicator: Additional words in the URL and altered characters.

Fake: “Amaz0n-login.net” (with “.net” instead of “.com” and “0” instead of “o”).
Real: “Amazon.com”
Fake Indicator: The domain name has been altered and uses a nonstandard extension.

Misspelled URLs, strange domain extensions (e.g., “.net” instead of “.com”), and extra words in the domain are all common features of fraudulent websites.

Journal Entry #7

Journal Entry#8

Journal entry #9

Journal Entry #10 Social cybersecurity is altering national security by focusing on the manipulation of human perceptions and social stability, rather than traditional cybersecurity, which targets information systems. Unlike traditional attacks, social cybersecurity, often known as “cognitive hacking,” aims to exploit societal vulnerabilities and change behaviors, attitudes, and faith in institutions through information warfare.

The piece focuses on Russia’s strategic use of deception, or “information blitzkrieg,” to divide and destabilize other states by sowing division. This tactic, based on Soviet-era propaganda techniques, uses modern technology to wage a non-physical sort of warfare that destabilizes governments from inside.

A major lesson is the multidisciplinary nature of social cybersecurity, which combines sciences such as sociology, psychology, and computational science to better identify and combat these threats. In modern warfare, sustaining societal cohesion and trust is as important as safeguarding physical infrastructure. As social cybersecurity evolves, military and policy leaders must integrate these insights to ensure national security in an increasingly interconnected world.

Journal Entry #11

Journal Entry #12

Economic Theories 1. Cost-Benefit Analysis

This economic theory looks at decisions by weighing the costs and benefits to get the most utility possible. The letter highlights the importance of reducing harm to those impacted while also keeping the organization’s liability in check. The organization is offering free credit monitoring for individuals, which shows they’re trying to balance the financial cost of these services with the possible reputational and legal risks of not handling things properly.

Behavioral Economics

Behavioral economics includes psychological insights that influence economic decision-making, and it connects to the letter by examining how consumers react after a breach. The letter aims to handle public perception and rebuild trust by recognizing the breach, giving clear instructions, and providing support like credit monitoring. This connects with concepts such as loss aversion, which focuses on reducing perceived harm to individuals, and nudging, which involves steering recipients toward certain protective actions.

Social Science Theories
1. Social Contract Theory

This theory looks at the unspoken agreements that exist between people and organizations within a society. The organization recognizes its duty to safeguard customers’ data, which is a key aspect of the social agreement in our digital world. The breach shows that there was a problem with this contract, and the letter is trying to fix things by saying sorry and explaining what steps will be taken to make it right.

2. Theory of Risk Society

Ulrich Beck’s Risk Society theory from sociology is really important. It suggests that today’s societies are more and more structured around handling risks, especially those that arise from technological progress. The breach and the notification letter show this idea: the organization faces risks linked to digital technology and tries to handle the societal impacts, like possible financial loss or identity theft for its customers.

In conclusion
The sample breach letter shows how organizations use economic ideas and social theories to deal with the consequences of cybersecurity incidents. When we look at it using cost-benefit analysis, behavioral economics, social contract theory, and risk society theory, we can understand how it balances responsibility, accountability, and the effects on society.

Journal Entry #13

Journal Entry #14

Journal entry #15

Davin’s journey to his career really highlights how important it is to have a mix of different fields of study. A career in digital forensics involves more than just technical skills such as recovering data or analyzing logs; it also requires an understanding of human behavior, motivation, and patterns. Digital forensics investigators usually search for digital footprints to understand why someone behaved in a particular manner. This connects closely to the study of how we make decisions and behave, along with insights from sociology about how culture and the environment influence those choices. Davin’s career path shows how important it is to have skills from different fields in today’s jobs. His mix of technical training and knowledge of human factors helps him effectively handle both the technical and social aspects of cybercrime.

Pages: 1 2 3 4 5 6