CYSE-201S-Assignments
Journal entry #1:
NLP, or natural language processing,
Appeal: If you’re interested in deciphering and working with human language, NLP can be a great field for you. Creating models and algorithms that let machines comprehend, interpret, and produce human language is the work of those in this subject.
Least Appeal: If you have no interest in linguistics or working with unstructured data, this may not be as intriguing to you.
Computer vision:Attractiveness: A career in computer vision may be a wonderful fit for you if you have an interest in visual data and would like to work on projects like object identification, image recognition, and video analysis.
Least Appeal: This field might not be as tempting to you if you find working with visual data to be less fascinating or difficult.
journal entry #2:
Observation and Interpretation:Scientific Principle: The steps in the scientific process include observation, hypothesis formation, and experimentation to verify the hypotheses.
Cybersecurity Connection: Security experts keep a close eye on and analyze system, network, and application behavior. They find possible threats, malicious activity patterns, and vulnerabilities using tools and methodologies.
Testing Hypotheses:Scientific Principle: An essential component of the scientific process is the testing of hypotheses through well planned experiments.
Cybersecurity Connection: Cybersecurity analysts and researchers investigate theories regarding possible weaknesses and risks to system security. This could entail testing the efficacy of security precautions, examining system behavior, and simulating assaults.
Journal entry #3:
Scholars utilize publicly accessible data breach information as an invaluable tool for conducting comprehensive investigations and evaluations in the field of cybersecurity. The kinds of data that are usually available include information regarding the attack vectors, compromised data, affected entities, and the nature of the breach. Through close examination of these disclosures to the public, researchers are able to identify commonalities, trends, and patterns among different incidents. They might look into the methods used by threat actors, the sectors or industries most vulnerable to hacks, and the particular weaknesses that are taken advantage of. Furthermore, researchers can utilize this data to determine new threats, evaluate how well security measures are working, and help create proactive cybersecurity plans.Data on breaches that is made available to the public is a valuable resource for comprehending how threats are changing and for providing guidance for ongoing initiatives to improve digital security and resilience.
Journal entry #4:
Physiological Requirements:These are the necessities for basic survival, which include warmth, food, water, and rest.
Digital Linkage: In the context of technology, physiological demands are satisfied by having access to fundamental digital resources like the internet for knowledge, communication tools for staying in touch, and online platforms for services. One way to satisfy the urge for sustenance is by ordering groceries online or through food delivery apps.
Needs for Safety:Physical safety, well-being, and financial stability are all aspects of safety needs.
Digital Connection: Security systems for house and personal safety, health tracking applications for monitoring well-being, and online banking for financial security are just a few ways that technology promotes safety. Encryption and password protection are additional factors that contribute to the security of digital data.
Journal entry #5: Applying Psychological Principles of Cyber Offending, Victimization, and
Professionals
Regarding Cash (1):
This motivation frequently wins out because money is the main motivator for a lot of cybercriminals. A common driving force for cybercrimes like ransomware, fraud, and identity theft is the desire for financial gain.
Political in nature (2):
Political motivations can have serious repercussions, particularly when state-sponsored entities carry out cyberterrorism, cyberespionage, or assaults with political goals. Cybercrimes with political motivations can have far-reaching effects and have an impact on national security.
Acknowledgment (3):
Getting attention is a typical motivation, whether it comes from hacktivist movements or personal fulfillment. Hackers may target well-known organizations in an attempt to attract attention and showcase their abilities, but overall the damage may be smaller than that of politically or financially motivated cybercrimes.
Retaliation (4):
Even though they are highly charged, cybercrimes driven by retaliation might not have as much of an impact as those driven by other reasons. These incidents frequently target certain people or organizations that the offender has personal grudges against.
Amusement (5):
Cybercrimes carried out for amusement—like hacking for the challenge’s rush—usually have less detrimental effects on society as a whole. Although they might interfere with systems, their goal is not directly related to seriously hurting people or organizations.
For Several Reasons (6):
It can be difficult to pin down the motivations of certain hackers since they may have multiple goals. Because of this intricacy, it may be more challenging to foresee or comprehend the reasons behind particular cybercrimes.
Boredom (7):
The motivation behind cybercrimes being driven by boredom is probably less common and significant. While people who engage in low-level online mischief may do so out of boredom, the results are usually not as bad as those who do so for other reasons.
Journal entry #6: Pay close attention to the website’s URL. In contrast to authentic websites, fake ones frequently have slightly changed or misspelled URLs. Could you check the domain name for any additional characters, odd domain extensions, or misspellings? In contrast to authentic websites, fake ones could contain low-resolution photos, erratic layouts, or subpar design. Keep in mind that design components like colors, typefaces, and logos could seem off or amateurish on phony websites.
Fake Websites:
- “www.amaz0n-deals.com” – This website mimics the design and layout of Amazon but has a misspelled URL and lacks HTTPS encryption.
- “www.bankofamerica-login.com” – This website imitates Bank of America’s login page but has a suspicious URL and does not provide any contact information.
- “www.apple-support-alert.com” – This website pretends to be Apple’s support page but contains grammatical errors and asks for sensitive information like credit card details.
- Real Websites:
- “www.amazon.com” – Amazon’s official website has a professional design, HTTPS encryption, and accurate contact information.
- “www.bankofamerica.com” – Bank of America’s official website is secure, with HTTPS encryption, and provides valid contact details.
- “www.apple.com” – Apple’s official website features high-quality content, HTTPS encryption, and clear contact information.
Journal entry #7: Imagine someone with a perplexed expression gazing at a computer screen. One possible caption for the meme would be, “When you realize your password is ‘password123’.” By emphasizing the value of user awareness and education in cybersecurity to avoid common mistakes like using weak passwords, this meme pertains to HSI.A cluster of individuals gathered around a PC appeared apprehensive. “When the IT department announces a cybersecurity breach,” may be the meme’s phrase. This meme is related to HSI because it highlights how important it is for human operators and technological systems to collaborate and communicate effectively in order to respond to security events.A person clutching a smartphone and wearing a surprised expression. “When you inadvertently click on a phishing email link,” might be the meme’s text. This meme highlights the human element in cybersecurity events and highlights the value of user awareness and education in identifying and averting social engineering scams.
Journal entry #8:Movies frequently show hackers as possessing nearly superhuman skills, breaking into highly secure networks with ease and staying undetected. In actuality, even experienced hackers confront formidable obstacles, and intrusions frequently necessitate substantial planning, time, and resources.A lot of movies present hacking methods in an erroneous or simplistic way. For instance, they might depict hackers frantically tapping away at a keyboard to get access to a system in a matter of seconds, while actual hacking takes a far more careful and sophisticated approach, frequently combining technical know-how with social engineering techniques.
journal entry #9:I couldn’t help but think about how much the media has shaped our perception of cybersecurity. After reading through a number of news stories, TV shows, and internet resources, I couldn’t help but observe how much of an influence the media has on how the general public views and understands cybersecurity issues. The sensationalism that is sometimes connected to news reports on cybersecurity is one noteworthy feature that I noticed. Media outlets usually report on cyberattacks, data breaches, and hacking incidents in a sensationalized manner, emphasizing the spectacular elements of these occurrences rather than offering context or in-depth analysis. Although this strategy might attract interest and attention, it occasionally results in false information or fear-mongering, which distorts our perception of the actual nature and extent of cybersecurity threats.