{"id":375,"date":"2025-02-04T18:11:56","date_gmt":"2025-02-04T18:11:56","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sarahbennett\/?page_id=375"},"modified":"2025-04-30T02:42:15","modified_gmt":"2025-04-30T02:42:15","slug":"journal-entry","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/sarahbennett\/journal-entry\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<p>J<strong>ournal Entry#1<\/strong><\/p>\n\n\n\n<p>Sarah Bennett<br>Week 1 Journal Entry<br>I reviewed the NICE workforce framework for cybersecurity that Professor Yalpi posted<br>on Canvas. One of the most interesting areas that caught my eye while reading is (investigation.)<br>This resonated with me because I want to pursue a cybersecurity job that relates to something<br>investigative. The roles that were mentioned in the framework, were Digital Forensic Analyst &amp;<br>Cyber Crime investigator. These jobs fully resonated with my interest in the investigation and<br>forensics field. These jobs go into depth with analyzing digital resources and evidence to support<br>and help law enforcement figure out criminal cases.<br>However, the least appealing thing to me after reviewing the framework was the<br>particular area of \u201cOversee and Govern.\u201d This topic seems very crucial for organizing and taking<br>on the initiative of select planning this area did not fully explain any governance or policy<br>regarding risk management. With that being said, this isn\u2019t as appealing because it does not<br>relate to investigations or cybercrime solutions.<\/p>\n\n\n\n<p><strong>Journal Entry #2<\/strong><\/p>\n\n\n\n<p>The principles of science within empiricism, determinism, parsimony, and objectivity are very crucial towards the foundation of cybersecurity. Firstly Determinism is the principle of science that behavior is caused or influenced by preceding events. For example, this principle suggests that cyber attacks or incidents happen because of a specific cause and effect situation. Empiricism &nbsp;means that the social scientist can only study behavior which is real to the scenes, such as taste, smell, touch, hearing, and sight. Scientists also agree that our knowledge in our disciplines must come from empirical research. Parsimony is the principle of science that means that scientists should keep their levels of explanation as simple &nbsp;as possible. For example, protocols and designs make systems easier to manage. Objectivity is a way that scientists study topics in a very value free manner and science does not exist to promote an option ion or point of view. In conclusion all of these principles that I have mentioned truly all use Somme sort of systematic way of cybersecurity to make it thrive as the field &nbsp;progresses each day. Here systems enable companies and organizations to help protect and mitigate the systems that they have put in place for their company. These strategies will help in the long run.&nbsp;<\/p>\n\n\n\n<p><strong>Journal Entry #3 <\/strong><\/p>\n\n\n\n<p>Individuals can see a comprehensive database visible to the public that shows data breach information, which many researchers can use to analyze many trends, causes, and most importantly security incidents and their impacts. While studying these breach reports, researchers can quickly identify vulnerabilities, vector attacks, and company weaknesses due to many different data exposures. The information in this reading helps assess the effectiveness of cyber security measures, incident strategies, and most importantly compliances that happen regularly. Researchers can also track the frequency of breaches within many different industries, which evaluates sectors that are mostly targeted. The data also allows the full understanding of how cyber threats evolve. Then again,&nbsp; researchers can also examine how organizations publicly state how breaches and languages are used, which contributes to insights into worldwide crisis communication and customer and consumer trust following a recent attack or incident.&nbsp;<\/p>\n\n\n\n<p>J<strong>ournal Entry # 4 <\/strong><\/p>\n\n\n\n<p>Maslow\u2019s Hierarchy of Needs fully outlines five levels of human needs that relate to my<br>experiences with cyber security technology.<br>1. Physiological Needs~ Depending on internet &amp; electricity are crucial for accessing<br>information getting access to information and communicating, like essentials such as<br>food and water.<br>2. Safety Needs~ Many Cyber requirements, such as strong passwords and antivirus<br>protection software, help mitigate and protect personal and financial data to ensure fully<br>protected and safe online experiences.<br>3. Esteem Needs~ Networking that is on a professional level, such as online sites like<br>LinkedIn, Facebook marketing, and so much more like that. These apps allow me to<br>professionally message and contact individuals to further pursue my professional career.<br>4. Love and Belonging~ Social media and messaging apps allow me to connect socially<br>with my family and friends.<br>5. Self-Realization ~ Having the help of technology and continuously learning how to<br>research mitigations procedures for the development of cyber security skills or my future<br>career in cyber forensics.<br>Throughout this entire read, each level of human needs is enhanced by different digital<br>experiences and shaping my life daily as an aspiring cyber forensic analyst!<\/p>\n\n\n\n<p><strong>Journal Entry # 5<\/strong><\/p>\n\n\n\n<p>This ranking considers the impact and prevalence of each motive, emphasizing that while some<br>reasons might be more understandable, none justify illegal activities.<br>Below, I will rank the articles linked to a motive from 1 to 7.<br>1. For Money: Financial gain continues to be a primary driving force for cybercriminals.<br>The HP Threat Research article highlights what many cybercriminals partake in and how<br>they spend their illegal earnings on luxury items.<br>2. Political \/Politics: Hacktivism has seen a huge rebuttle as far as youth hackers targeting<br>entities to promote political agendas, mainly bad. The Economic Times talks about this<br>new ripple of politically motivated cyberattacks and crimes. <\/p>\n\n\n\n<p>6. Multiple Reasons: Some cyber criminals have complex motivations, which include<br>financial gain, political beliefs, and most importantly, personal grievances. Infosecurity,<br>which explores multifaceted drivers.<br>7. Boredom: Engaging and interacting in cybercrimes out of boredom is the least justifiable<br>motive because it shows a disregard for the potential harm caused to victims.<br>The rankings above show the initial impact and prevalence of each motive that was listed,<br>which shows how some reasons might be more understandable, and none truly justify<br>illegal activities that are done<br>3. Revenge: Individuals having personal vendettas, which leads to malicious online<br>activities. Many news outlets from Wales report on victims of revenge porn which they<br>feel let down by law enforcement, making aware of the personal motives behind such<br>crimes.<br>4. Recognition: Many individuals seek notoriety through cyber exploits. A British individual<br>who had conducted a DDoS attack on a political candidate\u2019s website did so to possibly<br>seek attention.<br>5. Entertainment: Some hackers claim to act out of boredom or fun; however, howeve4r the<br>consequences they will endure are very severe. For example, an individual scraped 700<br>million LinkedIn profiles \u201cfor fun\u201d yet sold the data online.<\/p>\n\n\n\n<p><strong>Journal  Entry # 6 <\/strong><\/p>\n\n\n\n<p>The rise of many new websites allows a pathway for fraudulent websites targeting vulnerable<br>online users.<br>The first website that I encountered was amaz0n.con. At first glance, it looked like a<br>credible website, however, if you look again and more times, you will be able to notice some<br>key discrepancies. Firstly, there is a 0 instead of an o within the name. Secondly, instead of it<br>ending in .com it ended in .con. This was a major red flag for me because usually, credible<br>websites end to end in .com.<br>However, amazon.com which has no red flag at first glance and is a credible source<br>shows that it ends in an official URL such as .com and uses proper grammar. That the fake<br>website did not have.<br>The second website that I encountered was microsoft-support.net at first glance, this<br>does not seem like a credible website at all. The domain uses an unofficial URL such as .net<br>instead of a more official URL like .com or support. It also isn\u2019t as professional as many other<br>websites handle, especially with using a \u2013 between the sentences.<br>However, the real website, Microsoft.com\/support looks credible and is credible. It<br>displays a secure HTTPS connection uses proper grammar and is credible.<br>The third false website that I encountered was londoninsider.co.uk, as I stated earlier<br>the URL doesn\u2019t have an official ending such as .com, and is hard to believe that it is real.<br>However, the real comparable website bbc.com\/net uses a proper and official URL and<br>doesn\u2019t have any red flags at first glance, and once you press on the website, it shows that it is<br>credible.<\/p>\n\n\n\n<p><strong>Journal Entry # 7<\/strong> <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1217\" height=\"1238\" src=\"http:\/\/sites.wp.odu.edu\/sarahbennett\/wp-content\/uploads\/sites\/37357\/2025\/04\/Screenshot-2025-04-29-at-9.58.07\u202fPM.png\" alt=\"\" class=\"wp-image-394\" srcset=\"https:\/\/sites.wp.odu.edu\/sarahbennett\/wp-content\/uploads\/sites\/37357\/2025\/04\/Screenshot-2025-04-29-at-9.58.07\u202fPM.png 1217w, https:\/\/sites.wp.odu.edu\/sarahbennett\/wp-content\/uploads\/sites\/37357\/2025\/04\/Screenshot-2025-04-29-at-9.58.07\u202fPM-295x300.png 295w, https:\/\/sites.wp.odu.edu\/sarahbennett\/wp-content\/uploads\/sites\/37357\/2025\/04\/Screenshot-2025-04-29-at-9.58.07\u202fPM-1007x1024.png 1007w, https:\/\/sites.wp.odu.edu\/sarahbennett\/wp-content\/uploads\/sites\/37357\/2025\/04\/Screenshot-2025-04-29-at-9.58.07\u202fPM-768x781.png 768w\" sizes=\"(max-width: 1217px) 100vw, 1217px\" \/><\/figure>\n\n\n\n<p><strong>Journal Entry # 8 <\/strong><\/p>\n\n\n\n<p>Based on the video that I watched, Prof. Yalpi instructed us to watch it. The media<br>usually overexpress how hacking works. This makes it look very easy or overly dramatic to<br>viewers, creating false interpretations about cybersecurity. During the video, cyber expert Elzari<br>expresses and asses different hacking scenarios. These different scenes within the video show<br>how big of an influence how people view the protection aspect of cybersecurity. Many people<br>think that hacking is a simple skill, and others believe it to be on the harder and more<br>complicated side. Even though the media is very educational and can be for entertainment<br>purposes, it expresses an inaccurate misconception of how serious cyber threats and attacks<br>are and doesn\u2019t know the full value and security within cybersecurity.<\/p>\n\n\n\n<p><strong>Journal Entry # 9 <\/strong><\/p>\n\n\n\n<p>How did you score?&nbsp;<\/p>\n\n\n\n<p>On the social media scorer, I scored&nbsp;<strong>3 yes, 6 nos.<\/strong>&nbsp;<strong>&nbsp;I am labeled under risky usage.&nbsp;<\/strong><\/p>\n\n\n\n<p>What do you think about the items on the scale?&nbsp;<\/p>\n\n\n\n<p>I think that they were okay, I think the questions were more on the vaguer side, rather than having a full circle of questions that could properly identify the key pinpoints to individuals&#8217; social media disuse.&nbsp;<\/p>\n\n\n\n<p>Why do you think that different patterns are found across the world?<\/p>\n\n\n\n<p>I think it is based on the environment you are in\/around. Many parents allow their children to be on social media or websites because it keeps them occupied. However, the detrimental side-effects that reflect too much social media influence clearly show between children who do it and those who don&#8217;t. Adults like myself use social media as many different outlets. Blow off steam, educational\/ learning purposes, negative usage, and so much more. There are many different reasons people use social media, the majority is for positive and enjoyment purposes, and others, unfortunately for negative use.&nbsp;<\/p>\n\n\n\n<p><strong>Journal Entry # 10 <\/strong><\/p>\n\n\n\n<p>While reading this article, I believe I endured a brand new perspective on the values of<br>the future of cybersecurity. I normally would think of cybersecurity as a broad spectrum of<br>network security, malware\/phishing attacks, data analytics, and so much more. However, while<br>reading this article, I was able to see cybersecurity differently. It shows how individuals and<br>society are always being targeted for information through manipulation from information<br>online.<br>The authors go into detail about the definition of social cybersecurity and how society<br>needs to be protected from the harmful online experience. This involves, disinformation,<br>manipulation, misinformation, and organized campaigns for influence. The article also goes into<br>depth on how social media plays a huge play within the exploitation and manipulation of users<br>online.<br>The main thing that stood out to me the most would have to be how attackers simply<br>just spread false information, which creates online division and manipulates individuals. It<br>shows how critical and well needed, is for digital literacy for all online and offline individuals, to<br>make aware of how dangerous and critical this topic is.<br>Overall, I view cybersecurity way differently after analyzing and reading through this<br>document. Cybersecurity\u2019s job isn\u2019t only protecting the systems from online and cyber threats,<br>but it is also how can we defend individuals and society from the online manipulation especially<br>if one is not acclimated to digital literacy.<\/p>\n\n\n\n<p><strong>Journal Entry #11 <\/strong><\/p>\n\n\n\n<p>The video above highlights several aspects of social themes that endure the role that<br>cybersecurity analysts have. The main theme that the video focuses on is the emphasis on<br>collaboration and communication. Cyber analysts truly must have complex skills and effectively<br>convey security concepts, like training teams of technical and non-technical, ensuring that all<br>security regulations are implemented across the entire business or organization. These are very<br>necessary within a cyber analyst\u2019s career, and takes hard work and dedication to have the<br>ability to communicate these things among co-workers and others who need such information.<br>Additionally, Cyber analysts are also responsible for training and raising awareness<br>amongst co-workers and employees about the importance of security measures and the<br>importance of education with digital literacy. They also work in teams (teamwork) and have to<br>develop concepts and enforce security practices to effectively do their job properly.<\/p>\n\n\n\n<p><strong>Journal Entry # 12 <\/strong><\/p>\n\n\n\n<p>Two Economic Theories:&nbsp;<\/p>\n\n\n\n<p>1. Negative externalities are a data breach that affects the company and costs customers about identity theft, and financial losses. These negative externalities are the actions of the company that have been unintended when someone recognizes these negative externalities it is shown to emphasize the importance of implementing high security measures to mitigate attacks and breaches among consumers\/individuals and maintain their trust.<\/p>\n\n\n\n<p>2.&nbsp;Gordon-Loeb model: this model addresses the investment that should be made in information security to help mitigate and protect its data. This model shows that investing insecurity measures up to a substantial amount where the cost of an additional investment equals the marginal benefit and reduced expected loss from said breaches.<\/p>\n\n\n\n<p>Two Psychological Theories:&nbsp;<\/p>\n\n\n\n<p>1. Risk perception theory: this theory shows how individuals understand and respond to risk. When individuals are notified about a data breach, some individuals may feel anxiety or become scared because of the feeling of their information being breached this causes individuals to be stressed and lose confidence in a company or a business ability to protect their personal and financial data.<\/p>\n\n\n\n<p>2. Trust repair mechanism: after a breach when it comes to reestablishing trust within customers, it is crucial. Studies have shown that when companies are transparent, have good communication, and take full responsibility for the mistakes that have happened about breaches within personal information. This builds a certain bond and trust among customers, which makes them feel better about where they are choosing to keep their data.<\/p>\n\n\n\n<p><strong>Journal Entry # 13<\/strong> <\/p>\n\n\n\n<p>When it comes to bug bounty policies and invites, ethical factors identify security flaws all while exchanging for rewards that align with economic and cost-benefit propositions. This article highlights the effectiveness of a high amount of skill to find certain vulnerabilities that internal teams could discard or overall miss. Additionally, it shows that the programs are cost-efficient, diverse, and most importantly have good proactive threat detection. Somehow they do require careful management, reassurance, legal boundaries, and proof of resources. In conclusion, the bug bounty program provides an honorable and valuable source of cyber security, but when it comes to their effectiveness and success, it solely depends on how clear the rules are and how the organization can handle certain reports and implement certain rules and regulations.<\/p>\n\n\n\n<p><strong>Journal Entry  # 14 <\/strong><\/p>\n\n\n\n<p>The five most serious violations that the author Clario talks about in his online article are :\u00a0<\/p>\n\n\n\n<p>1. Using Unofficial Streaming Services- Many individuals like to take the easy way out and watch shows and movies on illegal sites or unofficial streaming services. When someone goes through an unauthorized site to watch shows, this goes behind the copyright laws and regulations that are put in place and can often cause potential malware and sometimes even legal consequences.&nbsp;&nbsp;<\/p>\n\n\n\n<p>2. Collecting Information about Children under 13- This as a whole is unacceptable whatsoever. Having and gathering videos for a minor, especially with no parental consent, violates many laws, but most importantly, the COPPA. The Children&#8217;s Online Privacy Protection Act.&nbsp;<\/p>\n\n\n\n<p>3. Bullying and Trolling- When an individual indulges in online bullying and harassment, it can not only cause civil lawsuits, but it can instantly turn into criminal charges. It is best to be nice and use kindness while on the Webb, for being mean only gets you to a dark place.&nbsp;<\/p>\n\n\n\n<p>4. Sharing passwords, address, or photos- Posting someone&#8217;s personal information including photos without their consent is illegal. It is illegal to take pictures of someone without their knowledge or post someone&#8217;s private information online. This goes against the Invasion of Privacy Act, and can cause civil\/criminal charges against an individual who participates in this.&nbsp;<\/p>\n\n\n\n<p>5. Faking your identity online- Committing fraud by using someone else&#8217;s information is very illegal. When you use someone&#8217;s information and it is not your own, you are not only committing fraud, but you have created a persona within this person&#8217;s identity without them even knowing. It isn&#8217;t fair to them and is outright just not fair at all. When an individual does this on social media, they are violating the &#8221; terms of use&#8221; within the platform&#8217;s policies, which they consented to before signing up.\u00a0<\/p>\n\n\n\n<p><strong>Journal Entry # 15<\/strong><\/p>\n\n\n\n<p>After watching and reviewing Davin Teo&#8217;s TEDx talk provided by Prof Yalpi, I was able to understand his view on digital forensics, and I was so positively intrigued by Teo&#8217;s pathway within his career and how it exemplifies success between social sciences and technology. He first began his career with a background in finance and commerce management. However, he then transitioned into digital forensics, which is a big leap and a career field. He is now the lead of the Forensic Technology team across Asia. He works around high-stakes legal files, data breaches, fraud, and investigations regarding digital forensics.<\/p>\n\n\n\n<p>I was intrigued by how he carried himself throughout his career. he is a huge inspiration for me as I go through my cyber career. He had personal motivation and emphasized the knowledge of understanding the principles of social sciences. I am very glad I watched this video and learned a lot about his career and journey within the technology field.\u00a0 <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal Entry#1 Sarah BennettWeek 1 Journal EntryI reviewed the NICE workforce framework for cybersecurity that Professor Yalpi postedon Canvas. One of the most interesting areas that caught my eye while reading is (investigation.)This resonated with me because I want to pursue a cybersecurity job that relates to somethinginvestigative. The roles that were mentioned in the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sarahbennett\/journal-entry\/\">Read More<\/a><\/div>\n","protected":false},"author":29856,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sarahbennett\/wp-json\/wp\/v2\/pages\/375"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sarahbennett\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sarahbennett\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sarahbennett\/wp-json\/wp\/v2\/users\/29856"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sarahbennett\/wp-json\/wp\/v2\/comments?post=375"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/sarahbennett\/wp-json\/wp\/v2\/pages\/375\/revisions"}],"predecessor-version":[{"id":399,"href":"https:\/\/sites.wp.odu.edu\/sarahbennett\/wp-json\/wp\/v2\/pages\/375\/revisions\/399"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sarahbennett\/wp-json\/wp\/v2\/media?parent=375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}