{"id":133,"date":"2024-09-18T16:09:12","date_gmt":"2024-09-18T16:09:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2024-12-08T18:40:39","modified_gmt":"2024-12-08T18:40:39","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/sripragna-aditha\/it-cyse-200t-2\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 1<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Areas of Interest:<br>1. Cybersecurity Workforce Management \u2013 It is a critical area within cybersecurity that<br>focuses on planning, developing, and managing the human resources required to maintain<br>and enhance an organization\u2019s cybersecurity posture. Since I believe I have strong<br>organizational and management skills which makes me interested in this role. I also enjoy<br>contributing to the long-term success of an organization through workforce management.<br>2. Security Control Assessment \u2013 It involves conducting independent assessments of<br>security controls within a system to evaluate their effectiveness. This role is crucial for<br>ensuring that security measures are functioning as intended and providing the necessary<br>protection against threats. This role requires a deep understanding of security controls and<br>their effectiveness, which can be intellectually stimulating. I enjoy analyzing complex<br>systems and identifying areas for improvement, I believe this role would be appealing to<br>me.<br>Areas of Lesser Appeal:<br>1. Communications Security (COMSEC) Management \u2013 It involves overseeing the<br>resources and practices related to securing communications within an organization. This<br>role is critical for protecting sensitive information and ensuring that communications<br>systems are secure against unauthorized access or breaches. The role involves working<br>with complex encryption technologies and communication systems. I prefer roles with<br>less technical detail and find dealing with highly specialized equipment less engaging.<\/p>\n\n\n\n<p><a href=\"https:\/\/niccs.cisa.gov\/workforce-development\/nice-framework\">https:\/\/niccs.cisa.gov\/workforce-development\/nice-framework<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 2<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">The principles of science significantly shape cybersecurity. Determinism suggests that<br>cyberattacks occur due to specific causes, such as system vulnerabilities, allowing professionals<br>to identify and mitigate risks. Relativism acknowledges that security solutions must be tailored to the unique context of each system. Parsimony promotes simplicity, encouraging streamlined,<br>efficient security measures. Ethical neutrality ensures unbiased risk assessments, focusing on<br>facts rather than subjective values. Objectivity allows for impartial evaluations of threats, crucial<br>for effective decision-making. Empiricism drives cybersecurity through data collection and real-<br>time analysis, helping to develop stronger defenses. Finally, skepticism encourages ongoing<br>questioning and testing of security systems, ensuring that no assumptions go unchallenged, and potential vulnerabilities are continuously explored. Together, these scientific principles enhance the understanding, prevention, and response to cyber threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 3<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">The website provides extensive resources for understanding data breaches, including the<br>&#8220;Chronology of Data Breaches,&#8221; which lists incidents of exposed consumer information dating<br>back to 2005. Researchers can use the data available on PrivacyRights.org to gain insights into<br>the prevalence, causes, and effects of data breaches. The website\u2019s database provides detailed<br>information about the types of breaches such as hacking, insider threats, or loss of physical<br>documents and the types of organizations affected like healthcare providers, financial<br>institutions, or educational entities. By analyzing this data, researchers can identify trends over<br>time, determine which industries are most vulnerable, and assess the effectiveness of regulatory measures like breach notification laws. Moreover, the data can be used to understand the personal impact on victims, especially in terms of identity theft risks and the exposure of sensitive information. Such analyses can ultimately inform the development of stronger cybersecurity policies and preventative measures to reduce future breaches.<\/p>\n\n\n\n<p><a href=\"https:\/\/privacyrights.org\/\">https:\/\/privacyrights.org\/<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Journal Entry<\/strong> 4<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Maslow&#8217;s Hierarchy of Needs is a psychological theory proposed by Abraham Maslow that<br>explains human motivation in terms of a five-tier model of needs. These needs are often<br>represented as a pyramid, with the most basic needs at the bottom and the higher-level needs at the top. Maslow\u2019s Hierarchy of Needs connects deeply to my experiences with technology. At the physiological level, technology supports basic needs like online food delivery, grocery<br>shopping, or health apps for monitoring well-being. For safety, digital tools like two-factor<br>authentication and antivirus software provide security for personal data and online transactions.<br>Social needs are met through social media, video calls, and messaging apps, allowing me to<br>maintain relationships despite physical distance. The esteem level is reflected in sharing<br>achievements on professional platforms like LinkedIn, where recognition from peers builds<br>confidence. Finally, at the self-actualization stage, technology offers endless learning<br>opportunities through online courses and resources, helping me pursue personal growth and<br>career goals.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 5<\/h2>\n\n\n\n<p><strong>1. For Money<\/strong><br><a href=\"https:\/\/threatresearch.ext.hp.com\/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-\ntheir-money-infographic\/\">https:\/\/threatresearch.ext.hp.com\/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-<br>their-money-infographic\/<\/a><br>Reason for Ranking: Financial gain is one of the most logical and common motives behind<br>cybercrime. The article highlights how cybercriminals often profit significantly from their<br>activities, spending money on luxury goods and illegal substances. This motive makes the most<br>sense because it directly correlates with a tangible reward, which can drive individuals to engage<br>in sophisticated cyberattacks or fraud.<br><strong>2. Political<\/strong><br><a href=\"https:\/\/economictimes.indiatimes.com\/magazines\/panache\/new-generation-of-angry-\nyouthful-hackers-join-the-hacktivism-wave-adding-to-cyber-security-\nwoes\/articleshow\/81707844.cms\">https:\/\/economictimes.indiatimes.com\/magazines\/panache\/new-generation-of-angry-<br>youthful-hackers-join-the-hacktivism-wave-adding-to-cyber-security-<br>woes\/articleshow\/81707844.cms<\/a><br>Reason for Ranking: Political motives are a powerful driving force for cybercrime, especially<br>in the form of hacktivism. The article illustrates how individuals and groups hack to support<br>political ideologies, protest injustices, or influence political outcomes. This makes sense as a<br>motive, given the high impact and publicity that political hacks can achieve, which can align<br>with an individual or group&#8217;s beliefs and goals.<br><strong>3. Recognition<\/strong><br><a href=\"https:\/\/www.theregister.com\/2021\/06\/30\/bradley_niblock_election_ddos\/\">https:\/\/www.theregister.com\/2021\/06\/30\/bradley_niblock_election_ddos\/<\/a><br>Reason for Ranking: Many hackers seek fame and recognition within their communities. The<br>article discusses how individuals, especially younger hackers, often carry out attacks to<br>demonstrate their skills and gain status. The desire for recognition can be a powerful motivator,<br>especially in the competitive world of hacking, where reputation matters.<br><strong>4. Revenge<\/strong><br><a href=\"https:\/\/newsfromwales.co.uk\/revenge-porn-victims-in-wales-often-feel-let-down-by-the-law-\nas-cybercrime-slips-through-the-net\/\">https:\/\/newsfromwales.co.uk\/revenge-porn-victims-in-wales-often-feel-let-down-by-the-law-<br>as-cybercrime-slips-through-the-net\/<\/a><br>Reason for Ranking: Cybercrime motivated by revenge can be highly personal and emotionally<br>driven. The article explains how cybercriminals use digital platforms to harm others as a form of<br>retaliation, such as in cases of revenge porn. This motive makes sense as emotions like anger and<br>the desire to &#8220;get even&#8221; can push individuals toward illegal actions in the digital sphere.<\/p>\n\n\n\n<p><strong>5. Multiple Reasons<\/strong><br><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/what-drives-hackers-to-a-life-\nof\/?__cf_chl_jschl_tk__=pmd_c1d89a4695edbd23f2bceb54d70f35ce5e536e86-1626721164-\n0-gqNtZGzNAfijcnBszQi6\">https:\/\/www.infosecurity-magazine.com\/news\/what-drives-hackers-to-a-life-<br>of\/?__cf_chl_jschl_tk__=pmd_c1d89a4695edbd23f2bceb54d70f35ce5e536e86-1626721164-<br>0-gqNtZGzNAfijcnBszQi6<\/a><br>Reason for Ranking: Hackers often have a mix of motives, including money, recognition, and<br>political beliefs. This article suggests that the motivation for cybercrime is not always<br>straightforward but can involve a combination of factors. This makes sense because human<br>behavior is complex, and people can be driven by various interconnected motives. However,<br>because it&#8217;s less specific, it ranks lower than motives with a clearer primary drive.<br><strong>6. Entertainment<\/strong><br><a href=\"https:\/\/9to5mac.com\/2021\/07\/19\/man-behind-linkedin-scraping\/\">https:\/\/9to5mac.com\/2021\/07\/19\/man-behind-linkedin-scraping\/<\/a><br>Reason for Ranking: Some individuals engage in cybercrime for entertainment or personal<br>amusement. While the article shows how some attacks are not driven by financial or political<br>reasons, the idea of cybercrime as mere entertainment is less common and logical compared to<br>motives like financial gain or political impact. However, it can be a factor for some, especially<br>those testing their skills for fun.<br><strong>7. Boredom<\/strong><br><a href=\"https:\/\/www.heraldlive.co.za\/news\/2021-05-31-cyberbullying-and-online-sexual-grooming-\nof-children-on-the-increase\/\">https:\/\/www.heraldlive.co.za\/news\/2021-05-31-cyberbullying-and-online-sexual-grooming-<br>of-children-on-the-increase\/<\/a><br>Reason for Ranking: Boredom seems to be one of the least compelling motives for cybercrime.<br>While the article discusses how children and teens might engage in cyberbullying due to<br>boredom, this motive does not seem as justifiable or strong as financial gain or political beliefs.<br>It\u2019s more indicative of impulsive, low-stakes activities rather than serious, planned cyber<br>offenses.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 6<\/h2>\n\n\n\n<p>1. Fake Website #1: www.amaz0n-support.com<br>Comparison with Real Website: Real Amazon URL is &#8220;www.amazon.com.&#8221;<br><strong>What Makes it Fake:<\/strong><br>o Misspelled URL: The zero (&#8216;0&#8217;) replacing the letter &#8216;o&#8217; in &#8220;amazon.&#8221; Phishing websites<br>often use slight misspellings or variations of official URLs to trick users.<br>o Unsecure Connection: Fake sites may lack a secure HTTPS connection. A padlock<br>symbol and &#8220;https:\/\/&#8221; should be in legitimate sites&#8217; URL bar.<br>2. Fake Website #2: www.palypal-secure.net<br>Comparison with Real Website: The Real PayPal URL is &#8220;www.paypal.com&#8221;<br><strong>What Makes it Fake:<\/strong><br>o Imitation of Official Name: Uses a name similar to &#8220;PayPal,&#8221; but with extra words like &#8220;-<br>secure&#8221; and &#8220;.net&#8221; to appear legitimate.<br>o Urgency and Pressure: Fake PayPal sites often include messages that rush users into<br>taking action, like &#8220;Your account has been locked!&#8221; or &#8220;Immediate action required!&#8221;<br>o Generic or Nonexistent Contact Information: Fake websites usually have incomplete or<br>generic contact information, unlike real websites which provide proper support channels<br>and verified contact details.<br>3. Fake Website #3: www.googIe-services.com<br>Comparison with Real Website: Real Google URL is &#8220;www.google.com.&#8221;<br><strong>What Makes it Fake:<\/strong><br>o URL Spoofing: In this fake URL, the lowercase &#8216;L&#8217; is replaced with an uppercase &#8216;I,&#8217;<br>making it look almost identical to the real URL. These types of typo squatting techniques<br>are common in phishing attempts.<br>o Unusual Requests: Fake Google sites may prompt users for passwords, credit card<br>numbers, or other sensitive information without proper context.<br>o Pop-Ups and Ads: Fake sites often have excessive pop-up ads, banner ads, and intrusive<br>surveys that legitimate websites would not employ.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 7<\/h2>\n\n\n\n<p>1. Person sitting front of a laptop:<\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"275\" height=\"183\" class=\"wp-image-335\" style=\"width: 150px\" src=\"http:\/\/sites.wp.odu.edu\/sripragna-aditha\/wp-content\/uploads\/sites\/37069\/2024\/12\/person-sitting-infront-a-laptop.jpeg\" alt=\"\"><br><strong>Meme:<\/strong> When you&#8217;re trying to log in, but the CAPTCHA asks if you&#8217;re a robot&#8230;and now<br>you are not so sure.<br><strong>Explanation:<\/strong> This meme highlights the frustration many users experience with<br>CAPTCHA systems. Human-centered cybersecurity would minimize these frustrations<br>while ensuring security, potentially through more user-friendly verification methods like<br>biometrics.<\/p>\n\n\n\n<p>2. Brown and white long-coated small dog wearing eyeglasses on black:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"196\" height=\"183\" src=\"https:\/\/sites.wp.odu.edu\/sripragna-aditha\/wp-content\/uploads\/sites\/37069\/2024\/12\/dog-1.jpeg\" alt=\"\" class=\"wp-image-337\" \/><\/figure>\n\n\n\n<p><strong>Meme:<\/strong> My humans: \u2018Dogs can\u2019t be hackers.\u2019 Me: \u2018Hold my chew toy<\/p>\n\n\n\n<p><strong>Explanation:<\/strong> This meme humorously highlights how even unexpected users (like pets)<br>could interact with technology. In cybersecurity, this can be analogous to emphasizing<br>awareness that threats or vulnerabilities can come from anywhere, even where you least<br>expect them.<\/p>\n\n\n\n<p>3. A woman in a white button-up shirt holding a silver iPhone 6:<\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"194\" height=\"259\" class=\"wp-image-338\" style=\"width: 150px\" src=\"http:\/\/sites.wp.odu.edu\/sripragna-aditha\/wp-content\/uploads\/sites\/37069\/2024\/12\/woman.jpeg\" alt=\"\"><br><strong>Meme:<\/strong> When the app asks for your location for \u2018better experience,\u2019 but you just wanted to order pizza.<\/p>\n\n\n\n<p><strong>Explanation: <\/strong>This meme points out the overreach of apps requesting unnecessary<br>permissions. A human-centered approach would emphasize user consent and better<br>education about why these permissions are needed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 8<\/h2>\n\n\n\n<p>In today&#8217;s journal, after watching the video &#8220;Hacker Rates 12 Hacking Scenes in Movies and<br>TV,&#8221; I reflected on how media shapes our understanding of cybersecurity. The video highlights<br>that Hollywood often exaggerates hacking for dramatic effect, portraying it as a fast, glamorous,<br>or overly simplistic process. This distortion creates misconceptions, making the public believe<br>hacking is either a superhuman skill or something anyone can do with minimal knowledge. For<br>example, movies frequently show hackers typing furiously at a keyboard while complex code<br>flies across the screen, and within minutes, they&#8217;ve bypassed the most secure systems. The<br>reality, as pointed out in the video, is far more nuanced. Real-world hacking involves a lot of<br>research, trial and error, and often time-consuming efforts that don\u2019t translate well to screen<br>drama. This media portrayal can influence how people view cybersecurity professionals and the<br>dangers of hacking. It can trivialize the seriousness of cyber threats or mislead people into<br>thinking that hacking is easy to carry out or defend against. As a result, the public may develop a<br>false sense of security, underestimating the need for robust defenses or overestimating the<br>capabilities of cybersecurity teams.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 9<\/h2>\n\n\n\n<p>After completing the SMD scale, I realized I met a few criteria, mainly in areas like<br>preoccupation and escape. The scale\u2019s questions, especially those about using social media to<br>deal with negative feelings or feeling dissatisfied with time limits, made me think about how<br>integrated social media is in my daily routine. It\u2019s eye-opening to see how these behaviors<br>overlap with addictive patterns.<br>The global differences in social media patterns could stem from various factors. For example, in<br>regions where technology access is high, people might develop more intense relationships with<br>social media. Meanwhile, in areas with a stronger emphasis on face-to-face interactions, people<br>might be less likely to experience some of these addictive behaviors. Cultural norms around<br>openness about mental health and social pressure to stay connected might also play a role.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 10<\/h2>\n\n\n\n<p>After reading the article on social cybersecurity from Military Review, I found its exploration of<br>cyber threats in a social context to be both eye-opening and relevant. The article highlights the<br>concept of &#8220;social cybersecurity,&#8221; which focuses on the intersection of traditional cybersecurity<br>and social influence. This approach examines how hostile entities can manipulate social<br>networks and information to influence public opinion, create division, and erode trust in<br>institutions. Social cybersecurity thus emphasizes protecting data and the social fabric from<br>manipulation.<br>One of the core insights I took from the article is that cybersecurity is no longer just a technical<br>issue; it has evolved to encompass social dynamics and psychological influence. This shift means<br>that defending against cyber threats now involves understanding human behavior and cultural<br>factors as much as technical defenses. The article details how misinformation campaigns exploit<br>social networks and public trust to spread disinformation, making individuals more vulnerable to<br>manipulation and shaping collective perceptions in ways that destabilize societies.<br>This article underscores the importance of public awareness and resilience. Educating individuals<br>about recognizing and resisting misinformation is just as critical as having robust technical<br>defenses. I am particularly drawn to the call for a multi-layered defense that integrates<br>technological tools with education and community initiatives to foster resilience against social<br>cyber threats.<br>In conclusion, the article suggests that a broader, more interdisciplinary approach to<br>cybersecurity is essential. Addressing the social aspects of cybersecurity could mitigate the<br>impact of cyber campaigns targeting public perception and trust. This broadened perspective<br>resonates with the evolving landscape of cybersecurity challenges today, where maintaining a<br>secure environment means guarding both information systems and the social contexts they<br>operate.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 11<\/h2>\n\n\n\n<p>In the video, the role of a cybersecurity analyst is described as both technical and socially<br>significant. A key social theme is the analyst\u2019s responsibility to protect not just data, but the trust<br>and safety of users and organizations. Cybersecurity analysts must anticipate how people might<br>react to threats, educate users on secure practices, and communicate risks effectively. This role<br>highlights the importance of understanding social behaviors, as analysts need to counteract<br>human tendencies that may lead to vulnerabilities\u2014like weak password practices or<br>susceptibility to phishing. Thus, the job involves bridging technical solutions with awareness of<br>human factors to foster a secure digital environment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 12<\/h2>\n\n\n\n<p>The Sample Data Breach Notification letter highlights multiple economic and social science<br>theories dimensions. Here\u2019s how two of each relate:<br>Economic Theories:<br>1. Transaction Cost Economics: This theory emphasizes the costs of participating in<br>economic exchanges, such as monitoring and enforcement costs. The data breach<br>illustrates an unanticipated increase in transaction costs, as customers now need to<br>monitor their financial accounts closely and may incur costs replacing cards or managing<br>fraud risks.<br>2. Behavioral Economics: This theory explores how psychological factors affect decision-<br>making, particularly under conditions of risk and uncertainty. The letter addresses<br>customer anxiety and provides instructions to mitigate identity theft, aiming to restore<br>trust. It acknowledges how customers might behave irrationally, possibly fearing<br>continued service use without reassurance.<br>Social Science Theories:<br>1. Social Contract Theory: This theory suggests that businesses and customers have an<br>implicit contract where businesses protect customer data in exchange for loyalty and<br>trust. The breach letter indicates a violation of this \u201ccontract,\u201d as customer data security<br>was compromised, highlighting the company\u2019s responsibility to rebuild this trust.<br>2. Risk Society Theory: Sociologist Ulrich Beck developed this theory, which proposes<br>that modern society is increasingly preoccupied with preventing and managing risks,<br>especially technologically mediated ones. The letter reflects this societal focus on data<br>security and the increased need for businesses to address potential identity theft and fraud<br>due to cybersecurity threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 13<\/h2>\n\n\n\n<p>Bug bounty programs have emerged as a pivotal strategy in cybersecurity, enabling<br>organizations to leverage external expertise for identifying vulnerabilities. The article &#8220;Hacking<br>for Good: Leveraging HackerOne Data to Develop an Economic Model of Bug Bounties&#8221; delves<br>into the economic dynamics of these programs, offering insights into their efficacy and<br>challenges.<br><strong>Literature Review:<\/strong><br>The literature review underscores the evolution of bug bounty programs, tracing their origins to<br>early initiatives by Netscape and Mozilla. It highlights the proliferation of platforms like<br>HackerOne and Bugcrowd, which have facilitated substantial financial rewards for ethical<br>hackers. The review emphasizes the dual benefits of these programs:<br>\u2022 Enhanced Security: Organizations can uncover vulnerabilities that might elude internal<br>teams by tapping into a global pool of security researchers.<br>\u2022 Cost-Effectiveness: Bug bounties often present a more economical alternative to<br>traditional security assessments, as payouts are contingent upon the discovery of valid<br>vulnerabilities.<br>However, the review also notes potential drawbacks, such as the risk of attracting malicious<br>actors and the challenge of managing a high volume of submissions.<br>Discussion of Findings:<br>The study&#8217;s findings, derived from an analysis of HackerOne data, reveal several key insights:<br>\u2022 Incentive Structures: The effectiveness of bug bounty programs is closely linked to the<br>design of their incentive models. Higher rewards tend to attract more skilled researchers,<br>leading to the identification of more critical vulnerabilities.<br>\u2022 Submission Quality: A significant portion of submissions are either duplicates or non-<br>issues, necessitating robust triage processes to manage the influx efficiently.<br>\u2022 Economic Impact: The financial outlay for bug bounties is generally lower than the<br>potential costs associated with security breaches, underscoring the economic viability of<br>these programs.<br>The article concludes that while bug bounty programs are not a panacea, they serve as a valuable<br>component of a comprehensive cybersecurity strategy. Their success hinges on well-structured<br>incentives, effective management of submissions, and integration with other security measures. In summary, the article provides a nuanced examination of bug bounty programs, highlighting<br>their economic rationale and practical considerations. It offers valuable insights for organizations<br>contemplating the adoption or optimization of such initiatives.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 14<\/h2>\n\n\n\n<p>Andriy Slynchuk identifies five online activities as particularly serious due to their legal and<br>ethical implications. First, using unofficial streaming services to access copyrighted content<br>without permission constitutes a violation of intellectual property rights. This offense is serious<br>because it undermines the livelihoods of content creators and companies, leading to financial<br>losses and disincentivizing innovation in media production. Second, using torrent services to<br>download or share copyrighted material compounds the issue of intellectual property theft by<br>facilitating the widespread distribution of protected content. This practice can lead to significant<br>legal consequences and damage the integrity of creative industries. Third, using copyrighted<br>images without permission violates the creator&#8217;s rights and disregards the legal frameworks<br>protecting intellectual property. Such actions may result in lawsuits, monetary penalties, or<br>reputational harm for the violator. It is particularly concerning because it disrespects the effort<br>and ownership of artists, photographers, and designers, weakening the foundation of creative<br>collaboration and respect. Fourth, sharing personal information of others without consent, such<br>as passwords, addresses, or private photos, breaches privacy laws and can lead to identity theft,<br>stalking, or harassment. This offense is serious as it endangers individuals\u2019 safety and erodes<br>trust in digital communication platforms. Finally, cyberbullying and trolling are serious offenses<br>that can cause emotional trauma, reputational harm, and even physical consequences for victims.<br>Engaging in such behavior is not only unethical but also illegal in many jurisdictions, with serious penalties including fines or imprisonment. These activities are particularly harmful as<br>they exploit the anonymity of the internet to harm others, creating a hostile online environment.<br>Each of these offenses is serious because they violate fundamental rights, such as intellectual<br>property, privacy, and personal dignity while eroding trust and safety in the digital space.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 15<\/h2>\n\n\n\n<p>After watching the video, I gained a deeper appreciation for how the career of digital forensics<br>investigators uniquely bridges technology and the social sciences. Digital forensics is not just<br>about analyzing bytes and code; it\u2019s about understanding the stories behind digital evidence and<br>how he connect to human behavior, societal patterns, and legal systems. The speaker&#8217;s career<br>pathway illustrates this integration beautifully. The speaker began his career with a strong<br>technical foundation, likely in computer science or information technology. This technical<br>background enabled him to master the tools and techniques necessary for recovering and<br>analyzing digital evidence. However, his journey didn\u2019t stop in the technical realm. He<br>recognized that digital forensics is as much about people as it is about technology. By exploring<br>fields such as criminology, psychology, and sociology, the speaker broadened his perspective,<br>equipping them to interpret digital evidence within the broader context of human behavior and<br>societal norms. This interdisciplinary approach is essential because cybercrimes are often rooted<br>in human motivations and societal structures. For example, understanding why someone might<br>engage in hacking or digital fraud often requires insights from psychology or sociology.<br>Similarly, analyzing how cybercrimes impact victims or society requires knowledge of social<br>science principles. The speaker\u2019s ability to draw from these diverse fields allows them to not<br>only investigate crimes but also provide context for his findings, making them invaluable in legal<br>and societal discussions.<br>One aspect of the speaker\u2019s pathway that stood out to me is his emphasis on the human element<br>in digital forensics. He highlighted how digital evidence is rarely self-explanatory; it requires interpretation within a legal and social framework. For instance, a recovered email or chat log<br>isn\u2019t just data, it\u2019s a window into the motivations, intentions, and relationships of the people<br>involved. The speaker\u2019s ability to connect these dots demonstrates how digital forensics relies on<br>critical thinking and an understanding of human behavior, skills deeply rooted in the social<br>sciences. I also appreciated how the speaker\u2019s career reflects the evolving nature of digital<br>forensics. As technology advances, so do the methods criminals use to exploit it. Digital<br>forensics investigators must continually adapt, staying ahead of trends in both technology and<br>societal behavior. This adaptability further underscores the importance of a multidisciplinary<br>approach, as it equips investigators to tackle emerging challenges from multiple angles. Overall,<br>the speaker\u2019s pathway to his career in digital forensics is inspiring. It shows that success in this<br>field requires more than technical expertise; it demands curiosity about human behavior, a<br>commitment to justice, and the ability to see the bigger picture. His journey also serves as a<br>reminder of the vital role social sciences play in technology-driven careers, making it clear that<br>interdisciplinary education is key to understanding and addressing the complexities of our digital<br>world.<\/p>\n\n\n\n<p><br><\/p>\n\n\n\n<ol>\n<li><\/li>\n<\/ol>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal Entry 1 Areas of Interest:1. Cybersecurity Workforce Management \u2013 It is a critical area within cybersecurity thatfocuses on planning, developing, and managing the human resources required to maintainand enhance an organization\u2019s cybersecurity posture. Since I believe I have strongorganizational and management skills which makes me interested in this role. I also enjoycontributing to the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sripragna-aditha\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29697,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sripragna-aditha\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sripragna-aditha\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sripragna-aditha\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sripragna-aditha\/wp-json\/wp\/v2\/users\/29697"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sripragna-aditha\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/sripragna-aditha\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":355,"href":"https:\/\/sites.wp.odu.edu\/sripragna-aditha\/wp-json\/wp\/v2\/pages\/133\/revisions\/355"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sripragna-aditha\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}