{"id":67,"date":"2025-02-02T15:09:11","date_gmt":"2025-02-02T15:09:11","guid":{"rendered":"http:\/\/totesa.website\/student\/?page_id=67"},"modified":"2025-04-27T19:31:22","modified_gmt":"2025-04-27T19:31:22","slug":"major-courses","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/simone-hatcher\/academics\/major-courses\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<p>January 13, 2025 &#8211; 1st Journal Entry<br>Reviewing NICE Framework and figure out which one is more interesting.<br>&#8220;Looking at the NICE Workforce Framework, certain areas that appealed to me the most was CI (cybersecurity intelligence) and IN (Investigation) because it sounds and looks interesting. I have family that does cybersecurity intelligence and I always wanted to get into it because they were financially stable. Investigation also sounds interesting because it deals with crimes so I could kind of be like a lawyer. The one that seems the least appealing to me was OG (Oversight and Governance), it just didn&#8217;t interest me. Most of it has management in the area and I don&#8217;t really want to be responsible for managing other people. It seems like a lot of work and not as fun as the other areas I&#8217;m interested.&#8221;<\/p>\n\n\n\n<p>January 26, 2025 &#8211; 2nd Journal Entry<br>Explain how the principles of science relate to cybersecurity.<br>&#8220;The principles of science are closely related to cybersecurity. Like scientists, cybersecurity experts observe patterns in attacks and study the data to understand vulnerabilities. They also test different solutions to cyber threats just like how scientists tests theories. While new threats emerges, cybersecurity experts adapt by improving their tools and methods which is similar to scientific knowledge evolves over time. Additionally, problem-solving is important in both fields, as experts use systematic ways to figure out how some attacks could happen again and how to prevent them.&#8221;<\/p>\n\n\n\n<p>February 2, 2025 &#8211; 3rd Journal Entry<br>This is about data breaches and how researchers might use the information to study breaches.<br>&#8220;PrivacyRights.org provides a lot of useful information about data breaches, it includes details like when each breach happened, the type of data that was data, how many records were affected, and which industries were involved. Researchers can look at this data to spot patterns like whether certain types of breaches happen more often or which security flaws are most targeted. Analyzing how often breaches happen and how severe they are, researches can also see if changes in laws or security measures are working. For example, they might look at trends in the breaches before and after new regulations are introduced to determine if they reduce the number of incidents. This can help researchers understand how breaches occur and how to improve strategies for protecting sensitive data. Overall, having access to this information allows researchers to better understand the causes of breaches and develop better ways to prevent them from happening as frequently.&#8221;<\/p>\n\n\n\n<p>February 9, 2025 &#8211; 4th Journal Entry<br>This was about Maslow&#8217;s Hierarchy of Needs and explaining how it connects to my\/peoples&#8217; experience with technology.<br>&#8220;Maslow&#8217;s hierarchy of Needs can be easily connected to our experiences with technology. In general, technology helps meet our physiological needs by offering services like food delivery apps or sleep trackers, which provide our meals and improve our health. For peoples&#8217; safety, secure online banking, GPS apps, and two factor authentication help keep people&#8217;s information protected from harm like hackers. Technology also support our love and belonging needs by enabling communication through social media, messaging apps, and video calls. All of these help keep people connected with their friends and family. In terms of esteem, platforms like TikTok and Instagram provide us ways to gain recognition and showcase accomplishments which boosts self-esteem tremendously. Ultimately, technology supports the process of becoming a better self. Offering better opportunities for personal growth, such as learning new skills through online courses or creating content on social media platforms like YouTube, Instagram, TikTok, Facebook, etc. can help allow us to explore our creativity and see our true potential.&#8221;<\/p>\n\n\n\n<p>February 16, 2025 &#8211; 5th Journal Entry<br>[No Entry]<\/p>\n\n\n\n<p>February 23, 2025 &#8211; 6th Journal Entry<br>This is about spotting fake websites compared to actual websites. (With examples included)<br>&#8220;Fake websites compared to real websites can be hard to spot sometimes. As someone who is on the internet all the time, I&#8217;ve fell victim to these fake websites because I wouldn&#8217;t look at the link closely enough to truly see the discrepancy. For example, &#8220;amaz0n-shop.com&#8221; &amp; &#8220;amazon.com&#8221;. The first link is the fake website because it has a zero in replace of the &#8220;o&#8221; and &#8220;shop&#8221; in it. Amazon has always been just one word and it&#8217;s users always say &#8220;amazon&#8221; not &#8220;amazon shop&#8221;. Another example of a fake website is &#8220;Bankofamerca.com&#8221; &amp; &#8220;Bankofamerica.com&#8221;. This one is harder to spot but the missing letter in the first link is &#8220;i&#8221;, which is in the actual website&#8217;s link. America is spelled with an &#8220;i&#8221; and not without it but some people might not see it when trying to access their bank accounts online. The last example is &#8220;bbc-news.co&#8221; &amp; &#8220;bbc.com&#8221;, This fake website can easily target older people who search for their news online. They could fall into the trap of not realizing that &#8220;bbc-news.co&#8221; is the wrong website until the click on the link and see the large amount of ads plastered on the website compared to &#8220;bbc.com&#8221;. Simple grammatical errors can also make it easier for people to see that the website is fake but it can take a few moments of being on that website for them to realize it&#8217;s fake.&#8221;<\/p>\n\n\n\n<p>March 2, 2025 &#8211; 7th Journal Entry<br>[No Entry]<\/p>\n\n\n\n<p>March 9, 2025 &#8211; 8th Journal Entry<br>[No Entry]<\/p>\n\n\n\n<p>March 23, 2025 &#8211; 9th Journal Entry<br>[No Entry]<\/p>\n\n\n\n<p>March 30, 2025 &#8211; 10th &amp; 11th Journal Entry<br>This is a summarization about how I felt about the article I read on social cybersecurity.<br>&#8220;Col. David M. Beskow and Dr. Kathleen M. Carley explain in their article, &#8220;Emerging National Security Requirement: Social Cybersecurity,&#8221; that social cybersecurity has become an urgent need for national defense strategy. The authors argue that cybersecurity should extend beyond systems to address the effects of cyberspace and cyber attacks on human behavior and society in the information warfare domain. In this technological era, they state that misinformation spreads quickly and has become a strategic weapon for various state and non-state actors.<br>They note that there are groups that take advantage of this situation to manipulate public opinion, foster distrust in institutions, and to further divide society. This trend is increasing, as it allows their adversaries to achieve significant results while keeping a distance from deploying physical force against any nation. These tactics are, figuratively, used to launch deception and influence people&#8217;s minds, rather than sending in troops. So now, this issue has gone from a purely technical cybersecurity to something entrenched in social and psychological issues.<br>Some of the ideas raised in the reading made me realize that cybersecurity is not limited to the protection of networks and data but also goes on to protect societies against manipulation and disinformation. This and more shows the gravity of the situation, owing to the quickness of electronic communication. Even a sloth could tell you that people have started sharing information before verifying the sources. There lies the urgent need for media literacy and also the socio-political and economic implications of disinformation detection and cyber threat policies.&#8221;<br><br>Second Entry<br>[No Entry]<\/p>\n\n\n\n<p>April 6, 2025 &#8211; 12th &amp; 13th Journal Entry<br>This about reading a letter about a breach and describing how two different economics theories and two different social sciences theories.<br>&#8220;Upon reviewing the the letter, I started to observe how economic and social science theories apply to real-life situations with respect to cybersecurity: the letter mentioned an instance in which a server belonging to a third-party company was compromised, leading to malware-induced loss of customer information. Unfortunately, the company did not learn its lesson until it was too late; customers had to be notified, and authorities were involved. There is an economic principle that stands out clearly, and that is cost-benefit analysis. The attackers can successfully determine the possible reward of pilfered credit card information against the risk associated with being caught. On the other hand, the company spent very little on security prior to the breach, which resulted in the underestimation of any possible losses. In the long run, the losses from the breach promise to exceed any security measures they would have taken. Another important economics concept worth mentioning is market failure. Due to the breach in the security of third-party system operations, customers suffered. This exemplifies what a flaw in a market mechanism brings to others, especially innocent buyers. From the point of view of social science, I have begun to think about social contract theories. Consumers trust companies with their data, assuming that these companies safeguard private information. Whoever is to blame, the breach of trust continues due to the parent company&#8217;s poor security of user data or warnings that are insufficient. Lastly, I also considered the theory of social capital. Once broken, consumers&#8217; trust in an organization is hardly restored. The letter does provide an explanation on the matter to consumers, but the injury to an organization&#8217;s reputation could last for ages according to theory.&#8221;<br><br>Second Entry<br>This entry is about reading an article and a summary reaction about it.<br>&#8220;Bug bounty programs are fun to get up close and personal with; as easy bounties, they allow organizations to pay ethical hackers for finding and reporting flaws in the systems. Most importantly, organizations are encouraged to unleash bounties to make individuals active participants in finding and fixing potential challenges instead of just waiting for an attack, which really makes it ingenious. All these, among other reasons, were discussed in their literature over increasing interest on Bug Bounty programs specifics among most big corporations like Google and Facebook. The authors discuss the promotion of concept as based on economic principles: payment-reward incentives had always proved to be effective in eliciting normal public behavior. Organizations could now afford to go beyond very high expenditure for the internal security team and benefit from significant savings by engaging external participants who probably perform real bounties in this case. When executed in the right way, this can be favorable to all parties involved. Berghoff has to agree that there are enormous advantages that bug bounty programmers can bestow. Its main use is that it actuates a global talent pool per se. Unfortunately, this talent pool will have some restrictions because most ethical hackers attempt to go after vulnerabilities beyond those typically found by in-house teams. On the other hand, competition among hackers sometimes affects collaboration. Some ethical hackers voice their displeasure about spending long hours on a report that would eventually be ignored. Overall, I believe bug bounty programs are well-structured systems but as the article states, careful design is very important. It is essential to pay respect to ethical hackers with some sort of reward; otherwise, the whole system might collapse.&#8221;<\/p>\n\n\n\n<p>April 13, 2025 &#8211; 14th Journal Entry<br>[No Entry]<\/p>\n\n\n\n<p>April 27, 2025 &#8211; 15th Journal Entry<br>Talking about Devin Teo TedTalk and how I feel about his ability to transition from one career to another one.<br>&#8220;The David Teo Ted Talk got me inspired and really pondering about how easy it is to transition into digital forensics. His journey from law to a digital forensic career clearly showcases the unique intertwining of different fields &#8211; technology versus social sciences &#8211; for within Teo&#8217;s work lies the typical line between technical analysis and a comprehensive understanding of human behavior, motives, and their effects on society &#8211; the key contours of social sciences. He integrates social science theories to broaden the scope of digital evidence and thereby to enhance the depth and success of investigations. His career path denounces the one-dimensional approach to the ever-evolving challenges of cybercrime.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>January 13, 2025 &#8211; 1st Journal EntryReviewing NICE Framework and figure out which one is more interesting.&#8220;Looking at the NICE Workforce Framework, certain areas that appealed to me the most was CI (cybersecurity intelligence) and IN (Investigation) because it sounds and looks interesting. I have family that does cybersecurity intelligence and I always wanted to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/simone-hatcher\/academics\/major-courses\/\">Read More<\/a><\/div>\n","protected":false},"author":29088,"featured_media":0,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/simone-hatcher\/wp-json\/wp\/v2\/pages\/67"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/simone-hatcher\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/simone-hatcher\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/simone-hatcher\/wp-json\/wp\/v2\/users\/29088"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/simone-hatcher\/wp-json\/wp\/v2\/comments?post=67"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/simone-hatcher\/wp-json\/wp\/v2\/pages\/67\/revisions"}],"predecessor-version":[{"id":280,"href":"https:\/\/sites.wp.odu.edu\/simone-hatcher\/wp-json\/wp\/v2\/pages\/67\/revisions\/280"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/simone-hatcher\/wp-json\/wp\/v2\/pages\/33"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/simone-hatcher\/wp-json\/wp\/v2\/media?parent=67"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}