Journal 1
The NICE Framework has seven different layers of categories that one may find of interest depending on their personality and tendencies. Personally from most to least preferred it would be operate and maintain, collect and operate, investigate, oversee and govern, protect and defend, securely provision, and analyze for last. Operating and maintaining is most preferred because it is hands on work that requires constant work and maintenance like my future career choice that is Network Engineering. Collect and operate is second because it requires a collection of data before operation. Tasks like this are fun because they require a collection of data for future purposes. Investigate is third because it is related to my second career choice which is something along the lines of cyber law. The curiosity inside of me finds it thrilling to investigate and figure out a solution for solving a problem. Fourthly, I chose to oversee and govern. I honestly am not very interested in this nor anything else down the road as I do intend to be a leader unless need be. While I do have my moments I found that there is almost always someone else with more experience of the operation. protect and defend is not as interesting but that depends on which profession you choose. It could be closely related to operating and maintaining since you will have to maintain the firewall or barrier from attacks with the ability to protect in the case of an unforeseen attack. This would be higher but It feels as if it would somewhat mellow with an emphasis on watching for an attack rather actually building or defending against the said attack. Secure provision is sixth because it felt similar to protecting and defending where you basically be watching and waiting for something to happen. I placed analyzing last because it didn’t feel the same as investigating which is why it ranked below the rest. This is mostly concerned with gathering information to determine whether or not it will be useful for future information systems, which is something that I am not personally interested in.
Journal 2
Science and Cybersecurity relate to each other because they both use similar techniques from each other to accomplish a similar task. For instance Cyber Security utilizes science and social techniques in order to solve problems. Science on the other hand uses Cybersecurity and technology for new possibilities and discoveries. Determinism relates because previous events are more than likely found to lead to future possibilities. Relativism relates because everything can be considered anything with the right category and definition. Objectivity is a third because it represents the different types of ways that a study takes place which is similar to someone studying or rather analyzing material for information systems. Parsimony is a fourth because Public speaking cyber experts must limit and confine their points to a crisp in order to grasp attention and avoid confusion. Empiricism can be considered a fifth since we utilize certain senses in order to accomplish day to day tasks and what not. Ethical Neutrality is another because it involves an adherence to ethical standards before assumptions are made which is perfectly in line with cybersecurity analysts. Each principle of science in some way shape or form can be related back to Cybersecurity whether it be through technology, senses, working manner, or lifestyle.
Journal 3
This information is extremely useful for many reasons related to the protection of systems and personal information. The first benefit that it provides is a dramatic yet necessary bluff. This will show individuals in cyber related courses the damage and effective cause of breaches to this date. It will also help towards encouraging them to work harder based on their certain field. Another way that this could help would be to analyze the section that discusses the types of data breaches organizations. Depending on the hack, disc, or port security systems that your company is trying to fight against it will be useful to know the level of impact that the said breach has had over the years. Utilizing the information that has been collected over the years is essential towards our growth
Journal 4
Since I am a technical person the mas-low’s hierarchy is graciously represented in my day to day tasks. The physiological needs are very beneficial because it best to have necessary bodily nutrients in order to carry out your task effectively like eating and sleeping. The safety and security factor is extremely useful to ensure that you aren’t clicking or messing with with illegal or malware corrupt sites like movie sites. Love and belonging is also necessary so that you have someone or something to go back to or rather talk to when you are frustrated in a time of need like a mother or father. Self esteem is a big one as being able to maintain and uphold a steady confidence allows you to carry yourself to the best ability. Lastly self actualization is very useful since it allows me to create newly developed tactics and formulas for code that have not yet been produced due to my creativity and experience.
Journal 5
To start with the least benefiting motive, I believe that entertainment would be the lowest of them all given the risk and potential legal issues that come along with it. I would rank boredom pretty low as well with entertainment since these feel like very low spots. I would rank revenge as a close fifth since it could be a good motive given the previous occupation and worker. I would fourthly rank multiple reasons since they stand out from the picks seven through five but I do not think that they compare to the upper three since there is proof of this being a big reason for security breaches and what not. I would political as third since there were previous reports of people stealing money from greedy businesses in order to give to the poor. Secondly I would rank money since it is a huge responsibility of threats in today age. A threat that people used to use would be to take out cent amounts from over two hundred thousand accounts weekly in order to gain financial growth. This was a big issue but has thankfully died down based on previous years. Firstly I would rank recognition as number one since this is the main reason to find breaches and zero day openings. There is a hacker that used to breach phones in order to jailbreak for the longest time but unfortunately Apple has started to crack down on their services.
Journal 6
As far as three real websites I will start with .gov, .org, and .edu. Websites with .gov are owned by the government with almost guaranteed levels of protection while being safe to browse. .org websites are also safe and are geared towards those looking for information similarly to .edu which is for articles and journals submitted for future development depending on the person that comes along to use the source. As far as three fake sites that I can think of, ones with .xyz, multiple ads, and long URLs come to mind. Websites with .xyz are usually used by individuals that are trying to copy another website with the intent of fooling the user. Rep sneaker sites are a great example of this. Sites with multiple ads are also sketchy since the ads that are used take you to other websites with unverified URLs. These sites use injected malware and can potentially mess your system up. Lastly we have websites with long URLs that should be avoided at all cost due to the reliability threats that they pose.
Journal 7
Meme 1 – Me when working on human system related operations
Meme 2 – Me when I cannot focus on what needs to be done
Meme 3 – Me successfully figuring out what I am doing
Meme 4 – Me when I need space to focus on my work
Meme 5 – Me confused at what I am doing
Meme 6 – Me when my work comes out successful
Meme 7 – Me taking a break and focusing on something fun
Meme 8 – Me conducting my work in a civil manner with proper posture
Meme 9 – Me working with others and conversing on better alternatives
Meme 10 – Me focusing on the ones I love away from work
Explanation – All of my memes relate back to Human system integration because everyone has a certain way about how they like to go about doing something. These memes represent that precisely since some take breaks, some people need space, and others like to work in groups to grasp the best alternative.
Journal 8
The media greatly influences our understanding about cybersecurity. While this is true there are a grand amount of scenes represented in media that simply are not true. Some scenes show screens running a simple line of code continuously in command prompt on a computer monitor to fool the end user into thinking that something complex is going on. Other movies tend to show the hacker enter one simple button combination in order to hack a computer without showing necessary steps to get to that point in time. However, movies do a great job at providing the imagery or rather visualization about how certain attacks can occur and take place. For instance, some people struggle with visualizing the words that others convey on them when explaining cyber related circumstances. Movies and TV are great at putting that into perspective for the benefit of others.
Journal 9
I scored or rather performed better than I thought that I would have given the information and learning at hand about the tactics in the video. I feel as if the items in the scale were slightly over exaggerated yet necessary to show how easy it is for someone to become compromised based on their social media activities. I express the comment of over exaggerated since someone would have to be pretty clumsy to make that mistakes of Dave in the video. Lastly, different patterns are found across different parts of the world since views and lifestyles are handled differently compared to our western way of thinking.
Journal 10
Read and write a journal entry that summarizes the article that I have read based on social cybersecurity. The article, in a sum of words, touches on aspects of social cybersecurity and how it is constantly changing. Due to this constant change it is mandatory to ensure that you the necessary steps and precautions are in place in order to counter these turns of events. The article sums this certain fact up perfectly by leading the reader onto the point that if the necessary points and factor aren’t in place based on social changes that it could lead to a greater amount of breaches and conflict. Social media has been the greatest influence, in my opinion, of breaches and wrong doing from cyber criminals that I have seen.
Journal 11
Write a summary reaction based on the use of policies for the journal. As far as my initial reaction based on the information at hand it was well received and rather underwhelming since I was expecting results like this based on the topic at hand. Looking at the results and methodology of the article we find that the results came out to be a success since the results were consistent with ex-ante assumptions that OLS is endogenous and 2SLS is exogenous. Looking further down near the end of the article at the conclusion, we find that many of the sources of endogeneity plaguing research in the cyber field were able to be removed which was quite surprising given the circumstance of the situation, topic, and research that went into this.
Journal 12
It is tough to pick out five of the eleven offenses for which are found to be the most serious but nonetheless I have picked faking your identity online to be the most illegal and offensive. I believe that this is so because it has a similar relation to forgery in person when thinking about it which can be criminal depending on the degree. Secondly I would place illegal searches as second because this could be anywhere from illegal porn all the way up to firearm purchases. Thirdly I will place collecting information about children at third since this is done subconsciously by a great amount of people. Fourthly I find using other people’s internet connections to be an obvious and blatantly illegal task especially due to the safety concerns behind it all. Since an unknown person was able to access your internet connection, they have the potential to conduct malicious tactics with some people unaware of whats going on. Lastly, I will put using unofficial streaming services as fifth since everyone does this under multiple justifications. Lately a lot of people have switched over to piracy due to Netflix and their personal streaming services.
Journal 13
( No Journal for Module 13 )
Journal 14
Write a paragraph about my thoughts and conclusions towards the speakers pathway to his career in digital forensics. Based on the readers definitions, explanations, and time that was put into this segment, it graciously grasps the reader in a way that shows us his passion and devotion towards his journey and trials. The crowd was a bit dry based on the jokes that he made which I found to be quite humorous however he did an astounding job when describing his topics. He discussed a brief explanation about digital forensics and then later on discussed how he himself got into the career path and how it has worked out for him. He later on discusses cameras, floppy disks, data collection, and stopping the internet as a whole. Lastly, he ends off with his in depth analysis and secondary lines of work before concluding. This was a very informative video that I can see myself revisiting when in need of help or career advice.