Journal Entry 4 CYSESS

Journal Entry 4

Ricardo Corpus

06/03/2024

Maslow’s Hierarchy of Needs makes a lot of sense when you think about how we use technology daily. Starting with physiological needs, while my phone and the internet aren’t as essential as food and water, they are important for staying connected and managing daily tasks. They help me keep track of schedules, communicate with others, and access important information. For safety needs, cybersecurity is crucial. For example, when my laptop gets a virus or there’s a data breach on a site I use, it’s like someone tampering with the lock on my door. Moving to belongingness and love needs, social media platforms like Facebook and Instagram help me stay connected with friends and family. These platforms are not just about posting updates but also about staying in the loop with what others are doing. Seeing updates from friends, sharing memes, and commenting on each other’s posts create a sense of community and keep relationships alive even when we can’t meet in person. It’s more about maintaining bonds and being part of each other’s lives in a casual, everyday manner. Regarding esteem needs, social media also plays a significant role. Positive feedback and engagement on my posts can be a nice boost, similar to getting recognition for something well done in real life. Engaging with others’ content and receiving thoughtful comments fosters a supportive environment. Even if there are negative comments, it’s all about keeping a level head and understanding that online interactions can be fleeting. Finally, for self-actualization, technology is a great enabler. I use online courses to learn new skills, watch tutorials to improve my hobbies, and join communities that share my interests. Technology provides the tools and resources to keep growing and achieving personal goals. For instance, using apps to track my fitness progress or participating in online challenges helps me stay motivated and strive for better health. Maslow’s hierarchy applies well to understanding how intertwined our digital and physical lives have become, and how technology meets various needs, from basic connectivity to personal growth.

Entry 3 CYSETS

Cyber technology has totally transformed the workplace, but it’s also opened up a lot of ways for people to mess around and break the rules. The vast access to information and systems it provides can tempt employees to misuse resources, commit fraud, or even engage in data theft. The anonymity of online interactions can lead to inappropriate behaviors like sending offensive emails or cyberbullying coworkers. The rise of remote work, thanks to cyber tech, means less direct supervision, making it easier for employees to slack off, misreport work hours, or use company assets for personal projects. This physical separation also complicates managers’ ability to monitor behavior, increasing the potential for misconduct. Cyber technology makes it simpler for disgruntled employees to sabotage company systems or steal sensitive data, causing operational disruptions and harming the company’s reputation. Social engineering and phishing attacks become more prevalent as cybercriminals exploit employees to gain unauthorized access to confidential information or install malware, leading to significant security breaches. Misuse of digital platforms for harassment can create a toxic work environment, and the sense of anonymity can embolden perpetrators. Plus, cyber tech makes it easier to create fake credentials or documents, which helps people pull off fraudulent activities. The ability to manipulate digital records or engage in financial fraud without getting caught right away is a huge problem. Companies need to step up with strong cybersecurity measures, thorough employee training, and effective monitoring systems to keep these risks in check. It’s crucial to build a culture of integrity and vigilance, where employees know about the potential for cyber deviance and are equipped to handle it responsibly. By staying proactive and informed, organizations can enjoy the benefits of cyber technology while minimizing its downsides. Encouraging ethical behavior, promoting transparency, and setting clear policies on the use of tech are essential steps. Regular audits and using advanced security technologies can also help spot and stop deviant behaviors early. Balancing the advantages of cyber technology with tight oversight and a strong ethical framework is key to keeping a secure and productive workplace.

Journal Entry 3 CYSESS

Journal Entry 3

Ricardo Corpus

5/29/24

Researchers can leverage the Privacy Rights Clearinghouse Data Breach Chronology to study breaches by analyzing trends and patterns, such as the most common types of breaches, affected sectors, and the frequency and scale of incidents. This helps identify vulnerabilities and evaluate the effectiveness of security measures over time. Social science branches that would benefit most include sociology, economics, criminology, and psychology. Sociologists could examine societal impacts and public perception, economists could assess financial repercussions on businesses and economies, criminologists could study the methods and motivations behind cybercrimes, and psychologists could explore the effects on individuals, such as stress and trust issues. For example, economists might quantify financial losses from breaches, while criminologists might identify patterns in breach methods to develop better prevention strategies. The comprehensive data provided by the Privacy Rights Clearinghouse offers valuable insights for these fields, helping to enhance our understanding and response to data breaches.

Entry 2 CYSETS

When storing electronic information about individuals, several ethical issues arise that must be carefully managed. First, privacy concerns are paramount. Storing personal data without adequate safeguards can lead to unauthorized access and misuse of sensitive information. This is particularly significant as vulnerabilities, such as unpatched applications or weak password management, can be exploited by threat agents. Second, data security is crucial to prevent breaches that expose personal information. Implementing robust access control mechanisms and encryption is essential to protect data integrity and confidentiality. Third, consent and transparency are ethical imperatives. Individuals must be informed about what data is being collected, how it will be used, and who will have access to it. Fourth, data accuracy and misuse pose ethical challenges. Incorrect or outdated information can harm individuals, and the data should not be used for purposes other than those explicitly consented to by the data subjects.

Comparing cybersecurity risks between the U.S. and another country, such as Ukraine, reveals both commonalities and differences. In the U.S., threats often include sophisticated cyber-attacks like the BlackEnergy malware, which has compromised numerous ICS environments, highlighting vulnerabilities in critical infrastructure. The 2015 Ukraine cyberattack, on the other hand, demonstrated how cyber threats could manipulate SCADA systems to cause widespread power outages. Both countries face threats from state-sponsored actors, but the geopolitical context can influence the nature and impact of these threats. For instance, U.S. infrastructure is targeted by diverse actors, including international gangs and terrorists, necessitating a multifaceted defense strategy involving governance and real-time attack detection. Ukraine’s experiences underscore the importance of securing ICS and SCADA networks against similar advanced threats.

Journal Entry 2 CYSESS

Journal Entry 2 

Ricardo Corpus 

5/23/2024 

The principles of science include relativism, objectivity, parsimony, skepticism, ethical neutrality, determinism, and empiricism. Relativism means everything is connected. So, in cybersecurity, if there’s a big tech change, it affects how people behave, the economy, policies, and society. It’s like a domino effect. For instance, new tech can change how people shop online, which impacts online security needs. Objectivity is about studying stuff without bias to truly advance knowledge. In cybersecurity, it means researchers need to keep their personal opinions out of it, especially when dealing with sensitive issues like online hate groups. You can’t let your feelings mess with the facts. Parsimony is all about simplicity. In cybersecurity, this means using simple theories to explain things like cybercrime. For example, the self-control theory suggests that people with low self-control might commit cybercrimes because they’re impulsive. Skepticism is questioning and testing everything. This is crucial in cybersecurity to make sure your defenses are solid and you’re not relying on unproven methods. It’s like always double-checking your locks before going to bed. Ethical neutrality means sticking to ethical standards. In cybersecurity research, this involves protecting people’s rights, like ensuring anonymity and getting consent when studying hackers’ behaviors. Determinism is the idea that behavior is influenced by past events. So, in cybersecurity, someone might be more likely to commit cybercrime if they’ve been exposed to certain online environments before. Finally, empiricism is about basing knowledge on observable and measurable data. In cybersecurity, this means studying real cyberattack patterns instead of just theorizing about them. 

Entry 1 CYSETS

I am interested in cybersecurity technology because it plays a critical role in protecting our digital world. Specifically, the areas of encryption and intrusion detection systems captivate me. Encryption ensures that sensitive information remains secure and accessible only to authorized parties, which is fundamental in our data-driven society. Intrusion detection systems are vital for identifying and responding to potential security threats in real-time, helping to prevent data breaches and cyber attacks. These technologies are essential for maintaining the integrity and security of digital systems, and my interest lies in understanding and improving these mechanisms to enhance overall cybersecurity.

  1. Computer Science:
    Computer Science is directly related to cybersecurity, providing the foundational knowledge in programming, algorithms, and systems architecture. Understanding how software and hardware function is crucial for developing secure systems and implementing effective security measures. Courses in cryptography, network security, and system vulnerabilities directly contribute to a comprehensive cybersecurity education .
  2. Electrical and Computer Engineering:
    This major focuses on the design and development of electronic systems and computers, which are integral to cybersecurity. Knowledge in this field is essential for understanding the hardware aspects of security, such as secure chip design and hardware encryption. Engineers with this background can develop robust security solutions at the hardware level, enhancing the overall security posture of systems .
  3. Information Technology:
    Information Technology (IT) covers the management and operation of computer systems and networks, making it highly relevant to cybersecurity. IT professionals are often on the front lines of implementing and managing security measures, such as firewalls, intrusion detection systems, and security policies. A solid IT foundation is essential for practical cybersecurity applications and management .
  4. Criminal Justice:
    Criminal Justice provides an understanding of the legal and ethical aspects of cybersecurity. Professionals in this field study cybercrime, digital forensics, and the impact of cyber attacks on society. This major complements cybersecurity by offering insights into the investigative and prosecutorial processes related to cyber incidents, helping bridge the gap between technical solutions and legal frameworks.

Journal Entry 1 CYSESS

Journal Entry 1 

Ricardo Corpus 

5/18/24 

  1. Strategic Planning and Policy is a specialty within the category of Oversee and Govern that is fascinating because it involves developing and advocating for policies that support cybersecurity initiatives. This role requires a big-picture perspective and the ability to influence organizational direction, which I find compelling. The chance to shape policy and strategy at a high level and drive meaningful changes in cybersecurity practices aligns with my interest in leadership and governance. 
  1. Incident Response is a specialty within the category of Protect and Defend that appeals to me due to its critical role in handling crises and urgent situations. The need to mitigate immediate threats and recover from incidents requires quick thinking and decisive actions, which I enjoy. This specialty is vital in minimizing damage and ensuring the security of information, making it a high-stakes and rewarding field. The investigative aspect of analyzing response activities also adds a layer of complexity that I find exciting. 
  1. Systems Analysis is a specialty within the category of Operate and Maintain that interests me because it bridges the gap between business needs and IT solutions. Designing secure and efficient information systems requires both technical expertise and a deep understanding of organizational processes. I appreciate the interdisciplinary nature of this role, which involves studying existing systems and procedures to create effective solutions. It’s a perfect blend of technical and business skills, making it intellectually stimulating.  

Data Administration is a specialty within the category of Operate and Maintain that is the least interesting to me because it involves routine management and administration of databases, which I find less engaging compared to more dynamic and immediate-response roles. While it is crucial for maintaining data integrity and security, the tasks seem more repetitive and less challenging. I prefer roles that require rapid problem-solving and strategic thinking over those focused on ongoing maintenance and administration