Journal Entry #1: To begin, after looking through the NICE Workforce Framework, the areas that I want to focus my career on is Design and Development. Because the design and development areas include roles that really interest me that are designing and creating systems, dealing with software, developing/creating/modifying/maintaining computer applications. I am very interested in these types of roles and thats what I want to focus my career on. I am really motivated to learning these types of roles so that I can use them for my career. The areas that I really do not have a interest in are investigation (IN). Although, I really cybersecurity for the software and developing purposes, but I am not really into the roles that cybercrime consist of. Too add on, I just don’t find identifying, collecting, examining data for cybercrime investigations very appealing.
Journal Entry #2: As we know the principle of empiricism enhances cybersecurity practices by actually finding evidence or facts rather then just assuming or giving it a good hypothesis on that subject. The empirical data collection and analysis help identify things like data from getting detected from cyber threats like hackers. Also, the empirical data collection and analysis also constantly keeps an eye on the security so that if there would become a weakness somewhere in the security it would be able to be fixed in a timely manner before there is a cyberattack. Another benefit to the The empirical data collection and analysis is that it has constantly changing defensive schemes which keep cyber threats away.
Journal Entry #3: I believe that researchers could use this information to study where at in the data gets targeted so, that when it happens again you will be much prepared and ready to stop your data from being breached. Also, I would use this information to research what time of the day that hackers tend to target data, I feel like this could be beneficial because if you learn the hackers tendencies, I believe it would make things way easier to predict and prepare for. Too add on, it would also be useful to analyze the information to where the hackers target, do they target big cities, small cities, large companies, or small companies, this would be helpful to know because this would to you a lot about what the hacker wants to get out of the data breach. Using everything I said above will eliminate most it not all future data breach trends.
Journal Entry #4: As we know Maslow’s Hierarchy of Needs pertains to five levels starting at physiological needs, safety needs, belongingness and love needs, esteem needs, and lastly self-actualization. After reading about Maslow’s Hierarchy of Needs and learning about the five levels I have a strong belief that technology relates to all of those. For physiological needs, for example use a health app on my apple watch that I use to track my steps, and to track my workout routine. There is food apps you can use to count calories so that you can eat healthy or lost weight. Next safety needs, for example at my house we have an alarm system to notify of any break ins or potential threats. ring doorbells are another example for safety they help with potential unwanted company, also helpful shows all of the recordings of when you are not even home. Belongingness and love needs, for example to stay in contact with family that live far away we always face time and also we have a big group chat to keep in contact. I also use snapchat and snap all of my family members everyday to keep a streak going. Esteem needs, for example when I graduated high school and got my associates degree I posted it on social media feeling great about myself. Self-actualization, after I did an online course on my own time for web development I was able to make my first website.
Journal Entry #5: After reviewing the articles with individuals motives, I rank these motives starting at 1 being money, then political, revenge, multiple reasons, recognition, curiosity, entertainment, and 8 being boredom. I have money at 1 because, on a motive standpoint I believe that most if not all hackers risk committing a cyber crime to earn a huge payday or use what they hacked from a company as leverage to earn even more money or bid it off somewhere else to a even bigger offer. I have political at 2 because, I believe that hackers commit cyber crimes against politics because, things like not liking what the government’s views are, or maybe acting out for changes to be made. I have revenge at 3 because, a hacker would want to commit a cyber crime to get revenge because, of something personal happened and want to get revenge, or got wrongfully fired by a company and wants to seek revenge. I have multiple reasons at 4 because, since there is multiple motives involved hackers will probably take a even better risk at committing a cyber crime due to the fact that money and recognition could be involved. Money is definitely a big motivator and the recognition you could potentially receive could always be worth risk in a hackers viewpoint. I have recognition at 5 because, I have seen some occasions where hackers take the risk at committing a cyber crime just to get noticed by other individuals or organizations to show off their skillset. I have curiosity at 6 because, for a hacker or someone that really likes programming I am sure at some point you get curious and want to put your skills to the test and try to hack big organizations to see if you can do it or not. But I do not believe its worth the risk of being curious to get yourself in some serious trouble. I have entertainment at 7 because, for a hacker I am sure its enjoyable to hack into something just for fun, but again not worth the risk of getting into some serious trouble with the law just to have fun. I have boredom at 8 because, I just can’t really see the reason behind hacking into something just because you are bored, I don’t feel this motive outweighs the rest.
Journal Entry #6:
Real: https://shop.steelers.com/
I believe that this website is fake because of the too good to be true price of this jersey. You would never find a top of the line official NFL jersey for just $42.99. The websites address looks off to me.
Real: https://shop.warriors.com/
This website is also believed to be fake as well because of the too good to be true price of this basketball jersey. You will never find a top notch NBA player’s jersey to be only $39. Also, the website address looks really odd to me.
Real: https://www.nike.com/
I believe that this website is fake because of the poor design, the website’s address looks really odd to me, and the price of these shoes on here seem very cheap to me not only are they Nike shoes they are also custom Pittsburgh Steelers shoes you are not getting those shoes for $69.
Journal Entry #7:
Photo Source: https://unsplash.com/photos/person-using-macbook-pro-on-white-table-AvSFPw5Tp68
Photo Description: This photo shows a person successfully connecting to an VPN, and now feels that he is protected by it while online.
Meme: “When you turn on your VPN and feel like nothing can attack you online now.”
Explanation relate to Human-centered Cybersecurity: Many users that connect to a VPN just think that they are 100 percent safe from all cyber attackers but thats not true. While a VPN does in fact protect you to a certain degree it does not protect you when individuals do things like go on unsafe links, and the same password for everything or weak passwords.
Photo Source: https://unsplash.com/photos/person-holding-iphone-mgYAR7BzBk4
Photo Description: This photo shows an individual with his iPhone showing there whole screen about to put there password in.
Meme: “When I am bad at making passwords so just make my password 123456.”
Explanation relate to Human-centered Cybersecurity: This highlights that some individuals would rather have an easy password to remember then having a strong secure password for your phone.
Photo Description: This photo shows a male programmer for what it looks like he is trying to debug an issue.
Meme: “When you spend hours on hours debugging and fixing the servers just for a hacker to come in due to a weak password in the system.”
Explanation relate to Human-centered Cybersecurity: This highlights that no matter how good your programming skills and how good your servers are but if your passwords are weak then its still easy for hackers to come in and take over the servers. Too add on, individual’s should make it there top priority to create strong and creative passwords.
Journal Entry #8: To begin, that was a great video I really enjoyed watching all of the movie and tv scenes and relating it to the real world scenarios. After analyzing and watching the video its can of crazy that I never realized how these movie and tv scenes try to make you think cybersecurity is easy, I saw multiple scenes where they try to influence you that hacking a computer or hacking into a agency is something you can do real quick is far from the truth it would take some time even if you had capability of doing it. To add on, when I was younger watching scenes similar to those in the video I used to believe that everything I saw in the movies was all real, until I started learning more about technology and cybersecurity and about how it all works. From watching these movie and tv scenes I believe its important to have cybersecurity training and create strong passwords to protect your devices and computers.
Journal Entry #9: After I answered the questions for the social media disorder scale I scored a 2 out of the 9 which I don’t believe is too bad. And based off what I scored on the social media disorder scale I am not a disordered social media user. I feel that these items in the scale are quite important for testing to see if an social media user has a serious or minor concern when it comes to their social media usage. I believe that there are different patterns of social media around the world because thats how everyone around the world communicates and stays in to touch. Sadly quite a lot of people overuse social media and it tends to takeover there life.
Journal Entry #10: The takeaway from this article to me is that how social cybersecurity can incorporate social algorithms, machine learning, and advanced cybersecurity tools to discover and decrease cyber threats online. I thought that its very cool that you can use social algorithms, machine learning, and advanced cybersecurity tools to be able to predict cyberbullying, impersonation attacks, cyber attacks, and any other types of methods cyber threats use. The cool thing about this is that you can use all of the data and information that was learned to predict cyber attacks and use it for training purposes to teach you and your employees so that you are prepared for any future situation that comes your way. I feel like as we learn more on how how to use algorithms, machine learning, and advanced cybersecurity tools to learn, predict, and decrease cyber threats online, over time we can definitely find more ways or methods to predict cyber attacks and prevent them from happening.
Journal Entry #11: As stated in the video cybersecurity analyst are monitoring the internet for any potential attacks and are the first line of defense online. The social themes are awareness training, teamwork, and trust. Awareness training, is which I believe is important because this training will help you think like an hacker and help you gain the awareness of predicting and finding any attacks or vulnerabilities in the system. Teamwork, is also important because cybersecurity is huge and everyone needs to communicate and be on the same page so that everyone can do there job and defend the internet from attacks. Trust, is also very important in the line of cybersecurity because cybersecurity analyst deal with peoples personal data everyday and its important for everyone to keep that too themselves at a professional level.
Journal Entry #12: So, the two different economics theories and two different psychological social sciences theories relate to the sample breach letter are Rational choice theory and Marxian economic theory and Behavioral theory and Cognitive Theory. Rational choice theory relates to the letter by for example, for the company to protect their image, and too keep their client’s trust, the company made it their top priority by letting their customers know that cyber attacks got a hold of customers personal information online from purchases. Marxian economic theory relates to the letter by when the company lets the customers know that their private information has been compromised by attackers. Which too me the company has all the power here, while the clients/customers have no power here and take risks at purchasing anything from the company and using there personal information to purchase anything and take big risks at their information getting breached by attackers. For the psychological social sciences theories, Cognitive theory relates to this letter by how this company’s communication and their decision-making process reflect on reducing anxiety and building confidence. Behavioral theory relates to the letter by the company and their clients/customers learn a value able lesson by learning from experiences, knowing the regulations, and social norms so that the two parties respond in a friendly professional matter.
Journal Entry #13: After reading the article my reaction to it would be that the main idea is that it investigates bug bounty policies as economic strategies so that we can improve cybersecurity. In the literature review, bug bounty policies are an affordable method of crowdsourcing vulnerability identification that strikes a balance between monetary and non- monetary incentives. In the discussion of the findings, show that cyber attackers have supply priced inelastic-elasticity that ranges between 0.1 and 0.2 which means that reputation and learning always outweigh monetary rewards. The amount of valid reports is essentially not affected by the revenue, brand profile, and company size, making these programs available to small and medium-sized companies. Although, programs tend to receive fewer and fewer reports over the time comes, which means a decrease in results. To conclude, this article highlights that the bug bounty policies democratize cybersecurity, continued participation which requires program strategies.
Journal Entry #14: The five most serious violations that I believe are the most serious are Using Copyrighted Images, Sharing Passwords, Addresses, or Photos of Others, Faking your Identity Online, Using Other People’s Internet Networks, and Illegal Searches on the Internet. Using copyrighted images is serious because it violates the rights of the people or individuals that made those images, which could have huge financial consequences to who use other people’s images without permission or payment. Sharing passwords, addresses, or photos of others are also very serious because it violates peoples personal privacy, and its also a huge risk your safety and your well-being. Faking your identity online is very serious because you could be a victim of fraud or theft, and could definitely destroy someone’s reputation online and steal from peoples or individuals finances. Using other people’s internet networks is very serious because using someone else’s internet without there permission or knowing could result in huge security risks and theft. Lastly, illegal searches on the internet is very serious because illegal searches on the internet can result in legal consequences especially if you are doing it for illegal purposes. These offences are serious because they risk the safety, privacy, and property rights of others as well as breaking the law.
Journal Entry #15: After watching this video, some of the ethical questions that the presentation that I had concerns for are, what are AI developers and platforms top priority in preventing the misuse of technology? Too add on, how can we as users on the internet correlate the positives and negatives of the use of AI? I believe that society should address these ethical concerns by learning and gaining a better understanding of AI, use it for creativity, or learn to use it to have a more healthy life like to use AI too make a workout schedule. Also, need to learn to not use AI for unethical reasons like theft, fraud, hacking into malware and other things that can potentially risk the safety of someone or a certain individual. I also believe that software engineers at tech companies should make things more secure like authentication and AI detection so that we can decrease the misuse of AI.