Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas are most appealing to you and which are least appealing.
- As I think about my future career path, I find myself most drawn to the areas of design and development as well as protection and defense within the cybersecurity field. These categories stand out to me because they align with both my interests and my strengths towards my ideal job role. On the design and development side, I enjoy the creativity and problem-solving involved in building secure systems and applications from the ground up. On the other hand, the protection and defense category excites me because it involves actively safeguarding systems against threats. Investigation doesn’t appeal to me because its more reactive instead of proactive.
Journal Entry 2
How does the principle of empiricism enhance the effectiveness of cybersecurity practices?
Reflect on how empirical data collection and analysis can help identify emerging threats, assess the effectiveness of current security measures, and guide the development of new strategies to protect information systems.
- Empiricism plays a critical role in strengthening cybersecurity by prioritizing the use of real, observable data that can be collected, tracked, and analyzed. By relying on empirical evidence, organizations can monitor patterns of activity, identify emerging threats, and evaluate the overall effectiveness of their security measures with greater accuracy. This data-driven approach not only enhances the ability to secure critical systems but also builds stronger protection for both customers and internal infrastructure. By using forensic analysis, the use of actual, verifiable data ensures that findings are supported by evidence, leading to accurate conclusions rather than assumptions or educated guesses. In conclusion, empiricism helps promote an evidence-based mindset, which is essential for adapting to the constantly evolving nature of cybersecurity threats.
Journal Entry 3
Visit PrivacyRights.orgLinks to an external site. to see the types of publicly available information about data breaches. How might researchers use this information to study breaches and forecast future data breach trends ? Enter a paragraph in your journal.
- The PrivacyRights.org database provides researchers and cybersecurity professionals with valuable insights into the trends and patterns that malicious actors use when attempting to steal sensitive information. By examining both the types of data targeted and the methods attackers employ, organizations can develop stronger defensive strategies to safeguard their own systems and protect their clients. When used alongside resources such as CVE.org, these tools offer a comprehensive framework for designing effective security policies and building resilient technological infrastructures. Together, they help organizations anticipate potential threats, reduce vulnerabilities, and strengthen their defenses against the increasing risks of data breaches. The use of sites like these further supports empiricism by promoting evidence-based practices that strengthen the evolving technological world.
Journal Entry 4
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
- At the foundation, technology supports my basic needs by providing access to essential resources. For instance, I use my smartphone and internet connection to order food and monitor my health through fitness and sleep trackers. Technology also plays a critical role in my sense of security, as I rely on strong passwords, multi-factor authentication, and antivirus software to safeguard personal information. Beyond safety, social media, video calls, and messaging apps keep me connected with friends, family, and colleagues regardless of time or distance. Technology further boosts my confidence and recognition by allowing me to showcase skills and achievements online. At the highest level, it provides endless opportunities for growth and creativity, from taking online courses to exploring coding platforms and design tools to expand my knowledge.
Journal Entry 5
Review the articles linked with each individual motive in slide/page #3. Rank the motives from 1 to 8 as the motives that you think make the most sense (being 1) to the least sense (being 8). Explain why you rank each motive the way you rank it.
- I rank multiple reasons as the top motivator because individuals often have more than one underlying motive when committing a cybercrime. Money takes the second spot, as financial gain is one of the most powerful and common motivators for most offenders. In third place is revenge, since many cybercrimes stem from personal grievances or a desire to harm those who have caused offense. Political motives rank fourth, whether carried out by state-sponsored actors fulfilling their roles or by individuals seeking to push back against government authorities in their own country. The fifth and sixth spots are interchangeable between recognition and entertainment. While these motivations are less compelling, they still drive some individuals who desire attention or amusement. Finally, curiosity and boredom rank lowest. To me, these do not seem like rational justifications for committing cybercrimes, as they lack the weight of more substantial motives.
Journal Entry 6
Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source].
Compare the three fake websites to three real websites and highlight the features and similarities that identify each fake website as fraudulent.
- PayPal phishing clones used lookalike domains such as paypa1.com to trick victims with urgent account warnings, directing them to fake login pages that stole credentials and enabled account theft. Similarly, Netflix subscription scams mimicked the platform’s login interface, warning users of billing errors. The stolen details caused account takeovers and credit card fraud, with victims losing an average of $2,270. Netflix responded by resetting passwords, issuing warnings, and improving fraud detection. During the FIFA World Cup, fake Nike websites promoted steep discounts on shoes through social media ads. Victims received counterfeits or nothing, prompting Nike to launch takedown campaigns. All three schemes relied on deceptive URLs and brand imitation.
https://www.memcyco.com/5-recent-examples-of-fake-websites/
Journal 8 Entry
Watch this video and pay attention to the way that movies distort hackers.Scientists Rate 65 Scenes from Movies and TV | How Real Is It? | Insider – YouTube Links to an external site.
- Depending on the type of entertainment produced, the media often exaggerates how cybersecurity and hacking are portrayed. In reality, cybersecurity work and hacking are neither easy nor quick, but the media tends to make them appear faster and more complex than they truly are. In the video, scenes from The Matrix and Mr. Robot include some realistic elements and processes, but they significantly shorten how long such actions would actually take. Based on the examples shown, TV series generally portray hacking with more realism than films. Overall, the media does a decent job of illustrating what cybercriminals and hackers are capable of, though it tends to overstate the timeline and technical language used in the IT world.
Journal 9 Entry
Watch this Video:
Social media and cybersecurity
- I scored a 1 on the media disorder scale, which suggests that my relationship with social media is relatively healthy. I tend to use social media mainly as an escape or a way to unwind from daily stress rather than as something I rely on constantly. I believe all the questions used in the scale are effective, but I would add one that asks about how often a person posts on social media and how many platforms they actively use. Including those factors could provide a clearer and more comprehensive picture of an individual’s media habits. Differences in media use patterns around the world can be influenced by many factors, including internet accessibility, social norms, cultural expectations, and technology availability.
Journal 10 Entry
Read this and write a journal entry summarizing your response to the article on social cybersecurity
https://www.sciencedirect.com/science/article/pii/S2451958825000831
- The article explores how cybersecurity extends beyond technology into human and social behavior. It examines how social manipulation, misinformation, and online influence campaigns exploit trust and communication networks. The authors review detection methods such as machine learning and network analysis while emphasizing challenges like data access and evolving threats. The study highlights that defending against cyberattacks requires understanding psychology, sociology, and community dynamics. It calls for collaboration between technical experts and social scientists to create proactive, socially informed defenses. Overall, the article reinforces that true cybersecurity depends not only on technical tools but also on addressing the human factors that shape digital vulnerability and resilience.
Journal 11 Entry
Watch this videoLinks to an external site.. As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0Links to an external site.
- In the video, Nicole highlights several important social behaviors that contribute to success in the cybersecurity field, including systematic thinking, strong technical and social skills, and a commitment to continuous learning. She emphasizes that cybersecurity professionals must think critically and methodically when solving problems, while also communicating effectively and collaborating with others. These behaviors demonstrate that cybersecurity is not only about technology but also about people and teamwork. The social themes I gathered from video are knowledge, sociability, and creative thinking. These themes reflect the human side of cybersecurity. Knowledge represents the need for constant growth and adaptation. Sociability highlights the importance of cooperation and communication. Creative thinking shows how innovation and flexibility help individuals respond effectively to evolving cyber threats and challenges.
Journal 12 Entry
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different psychological social sciences theories relate to the letter.
- The Attribution Theory and Trust and Risk Perception Theory are both relevant to this letter. According to the Attribution theory, individuals tend to assign blame to the most visible or familiar party when something goes wrong. In this case, customers are likely to hold Glasswasherparts.com responsible for the data breach, even though it was actually caused by a third-party platform provider. Meanwhile, Trust and Risk Perception Theory explains how people assess risks based on their confidence in an organization. Following the breach, customers may perceive a higher level of risk and develop reduced trust in the company’s ability to safeguard their personal information. From an economic standpoint, Rational Choice Theory can also be applied. The company made a calculated decision to use a third-party vendor to manage its website, likely weighing the costs and benefits of outsourcing versus maintaining in-house operations. Additionally, elements of Laissez-Faire economic theory are evident, as government involvement occurred only after the breach, primarily to investigate the incident and ensure the protection of customers’ privacy.
Journal 13 Entry
A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost/benefits principles. Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site. and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
- I personally believe that bug bounty policies are an excellent incentive for vulnerability assessments. These programs encourage ethical hackers and cybersecurity enthusiasts to identify weaknesses in systems before malicious actors can exploit them. Bug bounties not only allow individuals to demonstrate their technical skills and creativity but also provide organizations with valuable insights into potential attack vectors they might not have considered. By opening their systems to external testers, companies gain a broader perspective on how real-world hackers might attempt to compromise their networks. The article suggests that many participants in bug bounty programs are motivated by financial rewards, public recognition, and opportunities to showcase their skills for potential career advancement. For some, it’s a way to build credibility and experience in the cybersecurity field, while for others, it’s a chance to contribute positively to digital safety. Overall, bug bounty programs create a beneficial relationship between organizations and ethical hackers by enhance their security posture, and participants gain compensation, recognition, and valuable experience that can lead to professional growth.
Journal 14 Entry
Andriy Links to an external site.SlynchukLinks to an external site. Links to an external site.has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
- The five most serious violations from the list are using unofficial streaming services, torrenting, recording a VoIP call without consent, faking your identity online, and collecting information about children. These are big deals because they can cause real harm to people or businesses. Using unofficial streaming sites and torrenting can cost creators and companies a lot of money by stealing their content. Recording a VoIP call without permission is a huge invasion of privacy and breaks the trust people rely on for safe communication. Faking your identity online is dangerous as it can lead to fraud, identity theft, and manipulation. And collecting info about kids is especially serious because it puts vulnerable people at risk of exploitation. These offenses not only break the law but can also make online spaces unsafe for everyone.
Journal 15 Entry
Demetriade Street
Watch this video and describe, what ethical questions did the presentation raise for you? How do you think society should address these ethical concerns?
- The presentation brought up a lot of ethical questions for me, especially around things like trust and identity theft, political and financial scams, and even tech that seems built specifically for criminal use. It made me realize how easy it’s getting for people to fake identities or manipulate information, which can really mess with our ability to trust what we see online. That kind of uncertainty can lead to bigger problems, like influencing elections or tricking people out of their money. It’s also worrying to think about tools being created with harmful intentions from the start. I think society needs to tackle this by setting clearer rules, holding people accountable when they abuse technology, and teaching the public how to spot fake or misleading content. Developers and companies also need to follow ethical guidelines, so these tools aren’t used to cause harm.