Journal Entries:
- Some areas that I would focus on throughout my career would be Protect and Defend. This would help me have more awareness of any potential threats throughout the network. Securely Provision is the second category that I found the most appealing because this category reflects more of what I would like to do in the cybersecurity field like, monitoring the networks and making sure everything is all in check.
- Relativism relates to cybersecurity in terms of everything being connected within the system they share similar aspects and have an effect on everything for the most part. Objectivity relates to cybersecurity in terms of research because they can use this research to understand the behaviors that hackers portray which could help them understand and potentially see signs of an upcoming hack based off of patterns they may show. Parsimony is a meaning that scientists should keep their explanation to a bare minimum but still get their point across, condensing their information enough for people like the press to understand or the company they are working for. The majority of the principles are the study of cybersecurity activity committed by users to better understand the patterns of the good and bad in the field.
- Researchers would Study data breaches in hope of finding better ways to protect our data. They would study the different types to see where and how each breach could occur and what is the common reason these breaches are occurring through that particular area. They could also study what business would be the most common company that would most likely be hit or attempted for a breach into their system. The researchers’ goal as a whole is to figure out how the hackers are breaching the system to figure out ways to keep them out or prevent it.
- For the level of self-actualization technology has influenced me by providing social media where I can watch videos of people’s take on some aspects of life and their opinion and in some ways, I can relate to them or take a valuable lesson from them. For example, I watched a Tiktok where this guy was struggling with some similar situations that I was and he was giving advice to others on how to overcome the said situation and it helped me get past my issues. For esteemed needs technology has made me feel accomplished by utilizing technology to write reports for school and getting good grades for them after being submitted. For belongingness and needs, I found technology to allow me to connect with friends and significant others without having to be in their physical presence. For safety needs technology has allowed me to carry sensitive files consisting of documentation or photos for memories without the worry of it being stolen or tampered with. For Physiological needs, technology has allowed me to make purchases consisting of clothing, protein powder, or any nutrients or vitamins to keep me healthy.
- For the 1st slot I am putting is going to be boredom, because some people nowadays that are criminals will do just about anything to bring their form of joy into their day no matter how obscene the crime they commit is. The 2nd slot I am putting political, because hackers will do anything in their power to corrupt or mess up the system that involves politics because criminals like them want to ruin just about anything for anyone else, and for most people, politics have a significant influence on the majority of the country. For the 3rd slot I am putting is multiple reasons, because criminals can come up with different reasons to attack a database, money could be the motive or revenge on someone that could’ve done them wrong. For the 4th slot I am putting entertainment, criminals can do this for the sake of having fun and making others feel bad about themselves by tampering with their personal information. For the 5th slot I am putting recognition, some criminals want to have a reputation amongst other hackers and put an image on their name in hopes of fear or taking out their competition so they can run the show. For the 6th slot I am putting revenge, some hackers will take advantage of their knowledge and use it against someone that they may not particularly like or someone that did them wrong and feel like wanting to make those feel worse about themselves. For the 7th slot I am putting for money, now you may wonder why I put this last but I think that nowadays when I see a big case of an attack is usually to gather data and screw up someone’s database in hopes of putting them on a major setback to where that company has to spend more money to fix what they broke and the criminal hopes that their damages will put them out of business.
- So the most significant way to spot that a website is more than likely to be fake is to pay attention to what is on the page that you’ve been guided to, some have links that say to add antivirus software to protect you but it’s actually a link to download malware onto your computer and is tricking you. Another way to spot the difference is if they have a deal on their website that sounds almost too good to be true deals to get simple easy money out of you. The other way you can spot the difference is to look at the site itself which usually has blocks on the bottom where you can contact them for example the fake Paypal site that I found just has a simple login page with the boxes to enter in your credentials and they have no forms of contacting them or links to guide you to their site.
- Cyber memes link: https://docs.google.com/presentation/d/1MZDEXPaPO8juBG5hh6eScBgXkfNYsMCXi2GPRdTlr-U/edit?usp=sharing
- The media can raise awareness about cybersecurity threats and provide valuable information about how to protect against them. By reporting on major data breaches and cyberattacks, the media can help people understand the risks of how serious it is enough to encourage them to take steps to secure their personal and professional data. However, the media can also contribute to misinformation about cybersecurity, for example by emphasizing high-profile cyberattacks and portraying them as catastrophic events, the media may overstate the actual impact of such attacks and create unnecessary panic or fear.
- I answered 7 of the 9 questions yes in terms towards social media, I think that it was a pretty accurate test to reflect those that are actually addicted to social media, while however I am not as active on social media as I once was I believe that the addiction/urge to get on social media is still there because that’s where people go to see how their friends or people are doing and what they are up to. Cultural norms and values can have a significant impact on social media use, for example some cultures may place a greater emphasis on privacy and personal relationships while other cultures may place a greater emphasis on public sharing and networking, leading to more public social media usage or preference for more open social networks.
- One of the key themes that arises in the video is the importance of collaboration and communication in the field of cybersecurity. The presenter emphasizes the need for cybersecurity analysts to work closely with other members of an organization, including IT staff, executives, and end-users, to ensure that that security policies are effectively implemented and adhered to. Another social themes that arises is the importance of adaptability and flexibility in the face a rapidly evolving threats. The presenter notes that all cybersecurity threats are constantly changing and evolving and that analyst need to be able to adapt to all these new threats that are being created in order to mitigate against these new tactics being used.
- The article argues that while technical solutions such as firewalls and encryption are important, they are not sufficient on their own to address the complex and constantly evolving threats that organizations face in the digital age. Instead, authors emphasize the need to focus on human factors such as social engineering, insider threats, and user awareness and education. Overall, the article provides a compelling argument for the critical importance of social cybersecurity, and the need to focus on human factors in ensuring effective cybersecurity. I believe that we must focus on building a culture of cybersecurity that emphasizes communication, collaboration, and awareness.
- My reaction towards the use of the policies in this article is that I think that it is a good idea to utilize the use of the framework to focus on mitigating security risks. Overall I think that the article highlights the importance of policies in cybersecurity and how they can help organizations to better protect themselves against security risks and attacks. It provides a useful overview of the various types of policies that organizations can use and the benefits and challenges associated with policy implementation.
- Information economics is the study of how information is used and valued in economic systems. Information economics would be relevant in that it highlights the importance of the customer’s personal information, which has a value in the marketplace. Game theory is a branch of economics that studies decision-making in strategic situations where the outcome of one player’s depends on the decision of the other players. In context, game theory may be relevant in that it considers the potential actions and reactions of both the company and the customer in response to the breach. Social learning theory suggests that people learn through observation and imitation of others’ behaviors. In context, social learning theory may be relevant in that it can influence how customers react to the breach. Social identity theory suggests that people’s identities are formed in part by the groups to which they belong. In context, social identity theory may be relevant in terms of that it can influence how customers perceive themselves in relation to the company.
- The five most serious violations in my opinion are; identity theft, cyberstalking, hacking, distributing child pornography, and online fraud. These are all serious crimes that can cause significant harm to individuals and organizations. These offenses can result in financial loss, emotional distress, and damage to reputations, among other consequences. It is important for internet users to be aware of these potential violations and to take steps to protect themselves and others online.
- This TED talk provided a fascinating insight into the world of digital forensics and the career pathway of a digital forensics investigator. It demonstrated how the field of digital forensics intersects with both technical and social science skills, and the importance of critical thinking, ethics, and legal knowledge in this field.