CYSE 201s

Journal #1

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

The three areas of interest for me would be Operate and Maintain, Oversee and Govern, and Protect and Defend. These three interest me the most and seem to have a high degree of skill to improve on over time. As someone who enjoys and perhaps needs growth and development in their work, I would like to be interested whilst improving my work. The least interesting aspect of the framework would be Analyzing and Investigating as that seems highly tedious.

Journal #2

Explain how the principles of science relate to cybersecurity

Science, particularly the Social Sciences, directly relate to Cybersecurity. Cybersecurity directly relates to the human mind and the psychological tendencies of humans; if there was no human ego/selfish intent of breaching into data, then there would be no need to protect said data.

Journal #3

Visit PrivacyRights.org to see the types of publicly available information
about data breaches. How might researchers use this information to
study breaches?

Researchers can utilize this information to study breaches as the database hosts a plethora of public breaches with highly valuable information. Information such as how the breach occurred, whom it was occurred by, and what tools/methods were used can be very valuable to researchers for future improvements in security. The more information that is posted and reports are written and analyzed, the more secure we can make our systems and networks to prevent attacks.

Journal #4

Review Maslow’s Hierarchy of Needs and explain how each level
relates to your experiences with technology. Give specific examples of
how your digital experiences relate to each level of need.

Physiological Needs: Food, Water, Warmth – In today’s society, and in my modern life, each of these physiological needs is met utilizing technology. Food is now ordered from your smartphone and delivered to your door, water is heated and cooled and provided through a tap, and warmth is provided through electrical heating. Each level is, at some level, integrated with technology and can even be upgraded to be more integrated, such as your A/C unit controlled through your phone.

Safety Needs: Security, Safety – My home security system is completely accessible and controlled through my smartphone. Furthermore, the house I am in was built using some form of technology.

Belongingness and love needs: intimate friendships, friends – My intimate relationship is long distance and can only be kept and developed using our phones. It’s come to where we even watch a movie at the same time, without the internet and cellular device I would not have a relationship.

Esteem Needs: Prestige and feeling of accomplishment – Everything is digital now–Including this class. Most of my degree and most of my Associate’s Degree were done online, as well as any business venture I have started. Without the internet, the prestige and accomplishment I have cultivated would not have happened.

Self-Actualization: Achieving one’s full potential, including creative activities – I cannot say I have achieved this level yet, however, I can imagine that once I do, it will mostly be online. Whether it be an art form or a career that will fulfill my self-actualized vision, it will most likely be online.

Journal #5

Review the articles linked with each individual motive. Rank the
motives from 1 to 7 as the motives that you think make the most sense
(being 1) to the least sense (being 7). Explain why you rank each
motive the way you rank it.

  1. For Money – In this capitalistic society, if there is a majority of people doing something, it is most likely for money. Most hackers find that technology makes sense, and therefore they are good at it, whilst many are not. They utilize their abilities to extort money.
  2. Multiple Reasons – I don’t believe that there is just one reason for everything, there may be multiple underlying reasons that one wouldn’t think of about why someone is doing something.
  3. Entertainment – The majority of “hackers” are what are called script kiddies. They aren’t doing it for any big reason or expecting any huge returns, they most likely think it’s cool and fun.
  4. Political – This is a growing group of individuals who hack for political defamation or gain. It’s not hard to imagine that the number of corrupt politicians and corporations that there are individuals who believe they should do something about it.
  5. Recognition – I’ve put this one lower as I think multiple reasons better encompass this group. Ego is a large factor, however, usually, it is not the only one.
  6. Revenge – Either revenge for a person or revenge for a company, this feeling is a large driving factor in many negative scenarios caused by humans.
  7. Boredom – When reading the article under “Boredom” explained how bored teens explore the internet and become victims. Thus not explaining a motive for attacking. The attacker’s motives would be more suited towards entertainment or multiple reasons.

Journal #6