Module 1:
A few of the categories listed interest me for potential careers. I would put “Oversee and Govern” and “Securely Provision” towards the top of my list. I’m interested in “Oversee and Govern” because it gives me a chance to lead and be a people person. I like communicating with others, and that category would provide me with an option to express that. “Securely Provision” interests me because I like the risk management side to it. The reason these categories are at the top is because I don’t necessarily want to sit at a computer and code or run programs constantly. I would like to part of the bigger picture. Given that reasoning, I would put “Protect and Defend” and “Operate and Maintain” at the bottom. Other than those two, I would be interested in all the others not mentioned.
Module 2:
When it comes to the intertwining of science and cybersecurity, similarities can be pointed out. One of science’s main principles mentions how there must be data to back up hypotheses. Like science, cybersecurity deals a lot with unknowns. Having to form hypotheses and plans to figure out answers to problems is very common in both fields. Another aspect is peer review. In cybersecurity it is essential to have others review your work to make sure you don’t miss anything. There are plenty of similarities between the two because they are always evolving with new variables and experiences. Cybersecurity is typically a more aggressive field, but other than that they are very similar.
Module 3:
The information can help plan which areas need more protection from attacks. The most damaging are typically the “insider” and “physical” breaches. They are also some of the hardest to protect against. Seeing the data on the different kinds of breaches are important because it helps evolve the security. If there wasn’t data collected on the different breaches and their frequency, things would only get worse because the attackers would eventually figure out the defenses were the same. It can be harder to prevent the pettier theft options, but prioritizing the more frequent occurring and most expensive could save people from breaches in the future.
Module 4:
Starting at the top, Self-actualization would be the end goal. Reaching one’s potential is difficult because everyone can have a different opinion on what your potential could be. I have experienced it when I haven’t gotten the grades that I know I could’ve achieved, or even not passing the CompTIA exam. The next level is esteem needs(accomplishment feeling), and it is extremely hard for some people. The reason it is so difficult is because like the top category, it depends on your perspective of what is an accomplishment versus what isn’t. I have experiences with this when it comes to coding in the past. Sometimes you don’t feel accomplished jus because the code doesn’t run properly, but sometimes you need to realize what you accomplished to get to that point. Belongingness and love needs is the next category. I have a lot of friends in real life, but some of my best relationships are with people I met through gaming. It is amazing how relationships can form even with technology in between you and said person. Safety needs are very important. I have experienced this through someone else, my grandmother. She got caught in a phishing scam and lost a few thousand dollars thinking she missed a medical bill payment. This just emphasizes how important security is. Physiological needs are obviously the most important. They are essential to be able to complete the tasks necessary for your classes and work. In a technical sense, I have experienced this when trying to cram in homework before it is due, and you have to sacrifice sleep in order to finish the work.
Module 5:
Starting with the motive I think makes the most sense is “For Money.” I think this makes the most sense because it is something everyone is after. Money is what puts food on the table and can buy things you desire. I would put “Recognition” second because a lot of people want to join various hacking groups and are willing to do bad things for it. I have selected “Multiple Reasons” third most sensible because it is hard to pinpoint the motives down to just one. There could be hints of suggestion from other motives that add up. “Entertainment” is the next most sensible for me because it goes hand in hand with the next most sensible “Boredom.” The reasoning for these two is that a lot of people that are very talented at hacking could prey on places with less security for their own enjoyment even if they steal something or not. I think some people want to test themselves or their capabilities. I have put the two more aggressive motives last, “Revenge” and “Political” because I think they happen the least. I believe that they might be the worst motives, but there aren’t many people that fall into the category where this would even be an option. Revenge can be more sensible because some people might want to seek revenge after being fired from a company, but political you don’t see publicized as much.
Module 6:
Spotting fake websites is very difficult in some cases. If three were to be show to me side by side with the real ones, it could be difficult to tell which are which. The reason this is so hard is because some people are extremely talented in mimicking other websites. Especially if it is unexpected, a very small graphic being off could be ignored. The threat of cyber attacks has increased much in the last decade with these fake websites, and since it isn’t commonly taught to look out for them, it usually isn’t expected. It is something that needs to be taught, especially links from emails you receive.
Module 8:
The video reacting to hacking clips from Hollywood films is amusing. It shows how they don’t care to research what actually happens in the real world. I understand why, it is because although the information may not be accurate, it can sound more menacing and exciting than it really is. Obviously, some of the clips were real, such as the “Silicon Valley” show, where the goal isn’t to sound menacing to the audience, but be realistic. It just depends on the goal of the film. Typically, tv shows about technology have a higher chance of being accurate. Movies involving space travel and the CIA might be a little off in order to add a certain effect Hollywood is looking for. The media definitely makes hacking sound more interesting than it is by using different terms, but their goal is to be interesting, not factual.
Module 9:
The Social Media Disorder Scale is a good way to see how addicted you are to social media. It can show you things you didn’t realize were going on. I answered most of the questions no, but yes to 3 of them. I have lied about how much time I spend on social media to friends and family. I don’t spend a ton of time, but I still find it somewhat embarrassing and a waste of time. I have also set time limits on my iPhone but ignore them if I am bored. It has helped me to lower the total amount of time spent on it, but not enough for my liking. I have also used social media to distract myself from responsibilities such as homework or feeling bad. I would say that the results would be the worst in America because of the access to social media. It is very prominent for kids in middle school or younger nowadays to have a smartphone. The entire goal of these sites is to make you addicted to visiting them, so it’s not necessarily your fault if you are. Self-control is what divides the addicted from not addicted. I think a lot of people need to answer these questions for themselves.
Module 10:
Social Cybersecurity is a new approach in science where they try to forecast cyber-mediated changes in human behavior, social, cultural, and political outcomes. Its aim is to build an infrastructure that would allow society to persist in its essential character under changing circumstances of threats. The cyber space allows for wars to be started before they are announced because the fighting is done in the shadows. The primary difference between cybersecurity and social cybersecurity is that humans are using technology to hack other humans in social cybersecurity. This has been a growing topic recently with the attempted banning of TikTok. The government is afraid that a Chinese run app could have lasting impacts on the security of US citizens. IT is amazing to me how much technology can influence the people around the world. Social cybersecurity is the greatest threat in world in my opinion. It is much easier to slowly make someone think a certain way by showing them certain information. That is why there has been such a pushback on overusing social media recently. Technology is a great resource, but it can be used as a weapon by others, and it needs to be safe for use.
Module 11:
The sample breach letter was very intriguing. It is one of the first I’ve read. If I had to relate it to two social science theories, I would choose functionalist and conflict. I would choose functionalist because the letter focuses on a smaller set of people that were impacted by the attack. I would select conflict because it has to do with an attack relationship instead of just two normal parties. Two economic theories would be monetary and identity. Monetary because it could have implications on your bank account if your information was used against your knowledge. It would be identity because stealing someone’s identity can severely impact your monetary value as well. The letter goes on to warn about stealing your name, address, and payment info. Three things that can be the most important in your life.
Module 12:
The list of 11 illegal thing you unknowingly do online is very interesting. Some of these don’t seem serious, but there hasn’t been any accountability for the actions, meaning it is harder to convince people not to do them. The most serious violation is “collecting information about children.” I think this is the worst because there is no room for pedophilia in our society. There has been an increase it the news surrounding it, and it is despicable. The second most serious violation would have to be “sharing passwords, addresses, or photos of others.” This is so serious because what if they want that information to remain secure and you spreading it makes it the opposite. The next most serious would be “using torrent services.” Stealing files from another computer is illegal and can cause a lot of problems, especially if you take confidential information. Then, I would rank “faking your identity online” the next most serious. Whether it’s hiding your identity or stealing someone else’s, it can cause many problems. The fifth most serious would be “illegal searches on the internet.” I put this one up on the top 5 because going to these websites can cause security breaches on your device and network. It would be even worse if you exposed your private or corporate network to someone that wanted to get in. The reason you stay away from illegal websites is because they are illegal in the first place. Going to them will only cause yourself and others harm.
Module 14:
Criminologists stated that the vast majority of people say mean things to others, but they don’t commit cybercrimes or cyber bullying. They can use the relationships between the categories to figure out which might lead to committing others. Criminologists must have a difficult time predicting cybercrimes when it comes to cyber bullying. It is so simple for someone to be rude to someone online because they can hide behind screen names and voice changers. Cyber bullying is a difficult topic because as people move towards using more technology, especially when younger, it can cause bullying to rise. Potentially lower in person bullying, but online cyber bullying will increase. It is hard for the criminologist to explore relationships between the different items because they are steps of severity. A lot of people can be mean, but the minority will push for someone to harm themselves. It is a tough area to interact with since there are so many pieces constantly changing.