{"id":285,"date":"2025-02-03T00:04:02","date_gmt":"2025-02-03T00:04:02","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/shawnziegler\/?page_id=285"},"modified":"2025-04-26T16:39:17","modified_gmt":"2025-04-26T16:39:17","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/shawnziegler\/it-cyse-200t\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><strong>Discussion Boards<\/strong><\/p>\n\n\n\n<p><strong>Week 1 Discussion<\/strong><\/p>\n\n\n\n<p>Describe the top three careers of social science graduates that you would be interested in considering. What is it about those jobs that you find interesting? Respond to one other entry. <\/p>\n\n\n\n<p>Hello, my name is Shawn. The three graduate careers that I would be most interested in are administrative support, business and government careers, and policy analyst. I chose administrative support because I like being able to perform daily tasks and making sure things are running smoothly and that everyone within the workspace has everything in check to do their job. Business and government career was my second choice because being a cybersecurity major, I expect to be either working for a big company or possibly land a government job. My third choice is policy analyst. I chose this career path because it allows me to be able to research and analyze different policies within an organization. This career will also allow me to be able to identify problems and propose potential solutions to the company to fix the issues that are present.<\/p>\n\n\n\n<p><strong>Week 2 Discussion<\/strong><\/p>\n\n\n\n<p>What do you think about the principle of \u201cParsimony\u201d as it relates designing effective security systems?&nbsp;&nbsp;<\/p>\n\n\n\n<p>Clarifying information: &nbsp;An Effective security system is the one that consistently safeguards an organization\u2019s digital assets, data, networks, information, infrastructure from various security threats. <\/p>\n\n\n\n<p>When designing an effective security system, there will be many ways to do so. Implementing the principle of parsimony allows explanations that are simple to understand and allows the people involved to have a good understanding of how the system should operate and how data should be collected. If the organization provides the simplest explanations, there are less errors to occur when data is involved. I think this principle can be useful but will not work every time. If the individuals involved are experiencing a threat to the system and are only taught a simple method on how to combat the threat, it may not be the most accurate and could lead to difficulty fighting off the threat. The threat might require a complexity of methods and the people involved may have a difficult time regaining the system because they were only provided simple explanations and not provided enough information to fight off the threat.<\/p>\n\n\n\n<p><strong>Week 4 Discussion<\/strong><\/p>\n\n\n\n<p>Post a comment in the discussion board answering the question: \u201cApply the phrase victim precipitation to cyber victimization\u201d and respond to two other students posts. <\/p>\n\n\n\n<p>Cyber victimization and victim precipitation coincide with each other because the decisions that the victim makes in real life also affects the decision they make online. To prevent these decisions from happening again, victims often research behaviors that contributed to the victimization as a coping method. If the victim is not able to have a healthy coping mechanism this could lead to poor decisions. When the victim is browsing the internet and clicks a link that contains viruses is a good example of victim precipitation. Another good example is when the victim receives an email from a unfamiliar email address that contains a few attachments. The victim knows that the email is unfamiliar and still decides to open the attachments that could be unsecured documents.<\/p>\n\n\n\n<p><strong>Week 5 Discussion<\/strong><\/p>\n\n\n\n<p>Identify which theories you think best explain cybercrime and discuss what you like about that theory.&nbsp; Respond to two other student&#8217;s posts. <\/p>\n\n\n\n<p>I believe psychodynamic theory best describes cybercrime. When people experience trauma at a young age, it tends to make them think differently when it comes to making decisions. A lot of people deal with hearing voices in their heads when it comes to decision making. One voice is telling them to do the action that is presented in front of them and the other is saying not to proceed because it is a bad decision. This type of situation could be caused from previous trauma they experienced during their childhood. Also when it comes to social media or online, the person can make mean comments to others or cyberbully someone. This could be triggered from being bullied during their childhood by others making fun of the way they look, dress, or act. Since they were treated like this at a young age the person may be influenced to treat others like they were treated during their childhood.<\/p>\n\n\n\n<p><strong>Week 6 Discussion<\/strong><\/p>\n\n\n\n<p>Watch<a href=\"https:\/\/www.youtube.com\/watch?v=BpdcVfq2dB8\" target=\"_blank\" rel=\"noreferrer noopener\">this video https:\/\/www.youtube.com\/watch?v=BpdcVfq2dB8Links to an external site.<\/a><a href=\"https:\/\/www.youtube.com\/watch?v=BpdcVfq2dB8\"><\/a><\/p>\n\n\n\n<p>and pay attention to what the biggest risk of cyber threats are.&nbsp; After watching the video, post an entry in the discussion board describing what you think about the \u201chuman firewall\u201d.&nbsp; Respond to two other student&#8217;s entries. <\/p>\n\n\n\n<p>Cyber threats have quickly evolved and become more apparent in the recent years. A person must be very careful about how much information they share in real life. Sharing too much information puts their human firewall at risk and may result in their personal information being stolen. If a person\u2019s personal information has been leaked, they can be easily manipulated into doing things. In the video, the speaker states that education is important to be able to fix some of the important problems within cybersecurity. We rely on the internet so much and can become exposed to theft. Implementing awareness training should be mandatory as it allows for a safer and a more secure culture.<\/p>\n\n\n\n<p><strong>Week 10 Discussion<\/strong><\/p>\n\n\n\n<p>Watch this video<a href=\"https:\/\/www.youtube.com\/watch?app=desktop&amp;v=7TpsYofbAPA\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.youtube.com\/watch?app=desktop&amp;v=7TpsYofbAPALinks to an external site.<\/a><a href=\"https:\/\/www.youtube.com\/watch?app=desktop&amp;v=7TpsYofbAPA\"><\/a>&nbsp;<\/p>\n\n\n\n<p>about a 12-year-old cyber security expert.&nbsp; Pay attention to how he has embedded himself into the cybersecurity culture.&nbsp; Also, pay attention to how the ideas of knowledge, technology, and secrecy relate to his expertise.&nbsp; On the discussion board post an entry about how the video relates to something you read for this class \u2013 either from the readings or this module.&nbsp; Respond to two other student&#8217;s discussion board entries. <\/p>\n\n\n\n<p>I was shocked after watching this video because, at the age of 12, the kid in the video was able to hack and manipulate things. When we think of 12-year-old kids, we do not see them performing these types of tasks. In the video the 12-year-old talks about public Wi-Fi and Bluetooth connections. Connecting to these types of networks can put whoever is connected at risk. These networks could be hacked, and personal information is at risk for anyone connected. In module 6 we learned about free Wi-Fi networks and how we tend to trust them when in public areas to gain connection to the internet. Connecting to these public networks puts us at a huge risk of our data being obtained if a hacker were to hack the system.<\/p>\n\n\n\n<p><strong>Week 11 Discussion<\/strong><\/p>\n\n\n\n<p>Identify two research questions that researchers might address related to the social aspects of cybersecurity.&nbsp; Respond to two other student&#8217;s entries in terms of what you think about the questions they identified? <\/p>\n\n\n\n<p>How do social behaviors and norms influence cybersecurity practices?<\/p>\n\n\n\n<p>How do social media platforms contribute to the spread of misinformation and cyberattacks?<\/p>\n\n\n\n<p><strong>Week 12 DIscussion<\/strong><\/p>\n\n\n\n<p>What does economics have to do with cybersecurity?&nbsp; Enter your own entry and respond to two other student&#8217;s entries&nbsp; <\/p>\n\n\n\n<p>Economics plays a crucial role in cybersecurity. &nbsp;Cyberattacks are driven by economic incentives. Attackers seek financial gain, access to sensitive data, or the ability to distribute that data to others. Cybersecurity involves weighing benefits against costs and making strategic decisions, which are essential concepts in economics. Companies need to balance the expenses associated with implementing security systems, including investments in training and technology. Additionally, the relationship between cybersecurity and economics affects consumer confidence, stock markets, and international trade. To ensure that cybersecurity strategies are effective, it is important to understand these economic factors. A solid grasp of these concepts helps minimize risks and optimize resource allocation.<\/p>\n\n\n\n<p><strong>Week 14 Discussion<\/strong><\/p>\n\n\n\n<p>Why do you think individuals don\u2019t report cybercrime victimization?&nbsp; Describe your views and respond to one other student\u2019s entry. <\/p>\n\n\n\n<p>I think that some people do not report cybercrime victimization due to not having the knowledge of how to report the crime. Also, some people may believe that nothing can be done about the situation they\u2019re facing. There are also instances where people believe that the cybercrime they are facing is not a serious enough crime for them to report. A phishing scam is a good example many people may think that this situation is not that serious, so they do not bother reporting it. Reporting this situation can help others not suffer from the same scam and also make the company that is being impersonated aware of the issue as well. I believe that there is not enough information out there to specify what crimes should and should not be reported. Many people are not experienced with cybercrimes, so usually, when they fall into the situation, it is a first-time event.<\/p>\n\n\n\n<p><strong>Week 15 Discussion<\/strong><\/p>\n\n\n\n<p>Watch&nbsp;this video<a href=\"https:\/\/www.youtube.com\/watch?v=DOGUzKJ7Hog\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.youtube.com\/watch?v=DOGUzKJ7HogLinks to an external site.<\/a><a href=\"https:\/\/www.youtube.com\/watch?v=DOGUzKJ7Hog\"><\/a>and explain what it has to do with routine activities theory.&nbsp;Respond&nbsp;to at least one other classmate posts. <\/p>\n\n\n\n<p>The routine activities theory suggests that for a crime to occur, three elements must be present: an appropriate target, a potential offender, and an absence of a capable guardian. The video illustrates how easily individuals can be persuaded to purchase items through social media due to their interest in the products. People frequently encounter advertisements that they do not suspect to be fraudulent, especially when these advertisements appear on reputable social media platforms. Facebook, which is widely used and accessed daily, was specifically mentioned in the video. Users of these platforms are viewed as suitable targets because they are vulnerable and lack a capable guardian against such threats, which ultimately contributes to the occurrence of crime.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discussion Boards Week 1 Discussion Describe the top three careers of social science graduates that you would be interested in considering. What is it about those jobs that you find interesting? Respond to one other entry. Hello, my name is Shawn. The three graduate careers that I would be most interested in are administrative support,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/it-cyse-200t\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":30500,"featured_media":0,"parent":91,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-json\/wp\/v2\/pages\/285"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-json\/wp\/v2\/users\/30500"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-json\/wp\/v2\/comments?post=285"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-json\/wp\/v2\/pages\/285\/revisions"}],"predecessor-version":[{"id":317,"href":"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-json\/wp\/v2\/pages\/285\/revisions\/317"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-json\/wp\/v2\/pages\/91"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-json\/wp\/v2\/media?parent=285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}