{"id":336,"date":"2024-01-18T23:34:12","date_gmt":"2024-01-18T23:34:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/trball\/?page_id=336"},"modified":"2024-04-23T00:40:42","modified_gmt":"2024-04-23T00:40:42","slug":"journal-entries","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/trball\/journal-entries\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<p><strong><em>Week 1 <\/em><\/strong><\/p>\n\n\n\n<p><strong>Review the<\/strong><a href=\"https:\/\/niccs.cisa.gov\/workforce-development\/nice-framework\"><strong> <\/strong><strong>NICE Workforce Framework<\/strong><\/a><strong>. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.<\/strong><\/p>\n\n\n\n<p>There are certain areas that I would like to focus my career on, there are a few. The first one would be investigations. I would like to focus my career on this area because I get to investigate cybersecurity events that are related to IT and digital evidence. Like being digital forensics sounds like an excellent job to have since we can collect computer-related evidence to support vulnerabilities. An area that I am least interested in is the oversee and govern category, because I do not see myself providing leadership and direction so people can work more effectively on cybersecurity work. Like being an executive or manager does not seem fit to me.<\/p>\n\n\n\n<p><strong><em>Week 2<\/em><\/strong><\/p>\n\n\n\n<p><strong>Explain how the principles of science relate to cybersecurity.<\/strong><\/p>\n\n\n\n<p>There are many different principles of science that relate to cybersecurity; relativism, objectivity, parsimony, empiricism, ethical neutrality, and determinism. Relativism can be understood that all things are related to each other. An example can be that the health care system was changed with technological advancements. Objectivity is for the way that scientists study topics in a value free manner. Saying that science does not exist to promote an opinion. Parsimony says that scientists should keep their explanation as simple as possible. Simple is easier to read for everyone. Empiricism means that social scientists can only study behavior which is real to the senses. We shouldn\u2019t rely on opinions to frame our understanding of cybersecurity. Ethical Neutrality is the fact that scientists have to adhere to ethical standards, should police track human behavior through technology. Determinism means that behavior is caused or influenced by preceding events, individuals choose their actions.<\/p>\n\n\n\n<p><strong><em>Week 3 <\/em><\/strong><\/p>\n\n\n\n<p><strong>Visit <\/strong><a href=\"https:\/\/privacyrights.org\/data-breaches\"><strong>PrivacyRights.org<\/strong><\/a><strong> to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?<\/strong><\/p>\n\n\n\n<p>There is a lot of useful information on this site. On this site it shows you the numbers of breaches reported in the US throughout the years and the impacted records as well. It shows us a map of the United States stating the number of breaches in certain states. It also states the different types of breaches and what organizations were hit with the largest impact. Researchers might use this information to study breaches by looking at the number of breaches in a certain area to help counteract the number of breaches. They also can look at the different types of breaches and organizations that were affected to see what can be done to limit the amount of data breaches in the US. The researchers can see that most of the breaches come from banks, that have everyone&#8217;s personal information in their systems and can hack into that and get any amount of money as well.<\/p>\n\n\n\n<p><em><strong>Week 4<\/strong><\/em><\/p>\n\n\n\n<p><strong>Review Maslow\u2019s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.<\/strong><\/p>\n\n\n\n<p>With Maslow\u2019s Hierarchy of Needs there are five different levels. The first level is physiological needs. An example that many of us can relate to is if you lose your phone, you\u2019ll start to feel anxious or even angry. The second level is safety needs, like having security. Many of us have gotten some sort of virus on our phones or computers. After this happened most would try and find a way to prevent viruses from getting back into our devices. The third level is belongingness and love needs, like having any type of relationship. Most people use social media to connect with their friends, family, or even partners. The fourth level is esteem needs, like the feeling of accomplishment. You can post something on social media, and you would want positive feedback from others, but sometimes you won\u2019t get that. Everything can affect an individual&#8217;s self-esteem. The last level is self-actualization, like achieving one\u2019s full potential. Getting good grades, passing a test, getting a good paying job, having good relationships with others, or even getting to go on this big project for work. All those examples can be someone\u2019s full potential.<\/p>\n\n\n\n<p><em><strong>Week 5<\/strong><\/em><\/p>\n\n\n\n<p><strong>Review the articles linked with each individual motive in the presentation page or Slide #4.&nbsp; Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).&nbsp; Explain why you rank each motive the way you rank it.<\/strong><\/p>\n\n\n\n<p>After reviewing the many different articles about the individual&#8217;s motive these are my ranks of the different motives. The one motive that made the most sense to me would be the motive for revenge. When something happens to us as humans, one of our first instincts is to plot whatever revenge we thought fit. The next motive would be for political reasons, sometimes we can take politics a little too far. People will try to put in their opinions on what should be done in the government and even try to sabotage the results. The third motive would be for money. People could always have more money and there is an attack that is used mostly to get money, ransomware. Ransomware will lock down a system and wait for the company to give them the amount of money the attackers are asking for. The fourth motive to me would be boredom, because if you are bored you will do anything to try to entertain yourself. People will learn how to hack and or code to entertain themselves and then they will see how far they can get before they get caught. Which would lead me to the fifth motive being entertainment, humans will do anything to stop being bored whether that be going outside and playing a sport, playing video games, and even trying to hack into someone&#8217;s network and doing crime. The second to last motive in my opinion is for multiple reasons. Crime most of the time has multiple reasons so why wouldn&#8217;t cybercrimes not have multiple reasons. The last motive would be for recognition, most of the time hackers will go under an anonymous identity, it only gets revealed after the fact. Even though I put this at the bottom doesn\u2019t mean people don\u2019t use this as one of their main motives, but I don\u2019t think it\u2019s a main reason someone would try and hack into some companies\u2019 networks.<\/p>\n\n\n\n<p><strong><em>Week 6 <\/em><\/strong><\/p>\n\n\n\n<p><strong>Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?<\/strong><strong> <\/strong><\/p>\n\n\n\n<p>Fake websites are illegitimate internet websites used to deceive people into fraud or malicious attacks.<\/p>\n\n\n\n<ul>\n<li><a href=\"https:\/\/www.bankoffamerica.com\">https:\/\/www.bankoffamerica.com<\/a>\n<ul>\n<li>This is the fake website as you can see there is an extra \u201cf\u201d after the first one in the word \u201cof\u201d.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"https:\/\/www.bankofamerica.com\">https:\/\/www.bankofamerica.com<\/a>\n<ul>\n<li>This is the real website from Bank of America.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>We have to be careful when looking at the URLs from the websites, because the fake website looks real when you don\u2019t look at it properly.<\/p>\n\n\n\n<ul>\n<li><a href=\"https:\/\/www.ups.com\">https:\/\/www.ups.com<\/a>\n<ul>\n<li>This is the real website from UPS.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"https:\/\/usprenewal.com\">https:\/\/usprenewal.com<\/a>\n<ul>\n<li>This is a fake website. This website has been sent to many pretending to be UPS saying that your package could not be delivered correctly due to the wrong house number. There&#8217;s no \u201cwww.\u201d in front of the website.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>Look careful and pay attention to all the details especially if they are texted to you from a random number.<\/p>\n\n\n\n<ul>\n<li><a href=\"https:\/\/www.walmart.com\">https:\/\/www.walmart.com<\/a>\n<ul>\n<li>This is the real website for Walmart.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"https:\/\/www.waimart.com\">https:\/\/www.waImart.com<\/a>\n<ul>\n<li>This is the fake website for Walmart. By looking at it, it looks the same when just glossing over it, but with a deeper look you can see that the \u201cl\u201d in Walmart is a capital \u201cI\u201d instead.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>Again, we have to have a good look at certain things when looking at websites. These scam artists are getting clever when coming up with URLs. They\u2019re making them look like the real things, but changing the smallest things so we would overlook them and click on the site and give our personal information.<\/p>\n\n\n\n<p><strong><em>Week 7 <\/em><\/strong><\/p>\n\n\n\n<p><strong>Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s).<\/strong><\/p>\n\n\n\n<p><strong>Explain how your memes relate to Human-centered cybersecurity.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/docsz\/AD_4nXedXBXx4XGGVXB8rRlAlEsBdYtIerEB6tWfKcsnlf_K3MzCWCpsQO3cxbMjZUA9bBU_ctmKSC7xXtCvBNgTQYHamnhJpPjtgDMhLHxbhcv2jOnjNbWfCX9UmyZNsfBIJNYAxmy3ScpPuWvXSoX2gSOhEy5c?key=fY28MgP39d036lw32NuvTQ\" alt=\"\" style=\"width:453px;height:auto\" \/><\/figure>\n\n\n\n<p>\u201cIt was so easy to hack into this company, thank you for phishing emails.\u201d<\/p>\n\n\n\n<p>We need to teach people not to click on random links. Even if they look like they come from your boss, double check with your boss to make sure that it was actually them that sent that email.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/docsz\/AD_4nXdnxJMgqNP4Ps26DTul2xbhsOeCRcKgoQ5bt7LKmoLCS_GiPcCEI6GFpHS2cq-ucMSDOotADF-As4eIJ8i5DbWlEeBw3MYvk0DUlDam2mPKcoJN2e8DwR7PIfPp_dwE_P58sHVZiG1t5C8XK3vIGTQaycs?key=fY28MgP39d036lw32NuvTQ\" alt=\"\" style=\"width:444px;height:auto\" \/><\/figure>\n\n\n\n<p>\u201cTrying to explain something so simple, but others try and complain about things so much.\u201d<\/p>\n\n\n\n<p>Even if you explain everything to someone there will still be some sort of human error but all we can do is try to reduce the amount of error due to humans.<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/docsz\/AD_4nXeSD8hdVtGO7j-hLWXyfpeaZ5AeriwUE2Dg9awkvnaeCPVwfFtg-J8SI9-txLSQHdfpr0_pktsiu_xK3dFY2BUku1eEpamwChOlU9J2C9wdqoNg7pdxJOR31wdrGnXvhAEhGqg4nC3rRbiVzB-8Td3wtFs?key=fY28MgP39d036lw32NuvTQ\" alt=\"\" style=\"width:452px;height:auto\" \/><\/figure>\n\n\n\n<p>\u201cThis training is important for this company, time to make it fun. \u201d<\/p>\n\n\n\n<p>Having the people in the company going to training will help the company reduce the amount of human error within the company in the network.<\/p>\n\n\n\n<p><strong><em>Week 8 <\/em><\/strong><\/p>\n\n\n\n<p><strong>Watch this video and pay attention to the way that movies distort hackers.<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.youtube.com\/watch?app=desktop&amp;v=6BqpU4V0Ypk\"><strong>Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? &#8211; YouTube<\/strong><\/a><\/p>\n\n\n\n<p><strong>After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.<\/strong><\/p>\n\n\n\n<p>After watching the video, we can say that the media can have both a positive and negative influence on people&#8217;s understanding of cybersecurity. Some films and television shows show the real world of cyber security terms and how to handle them. Like in the video you see an individual making a phishing email that is sent to another individual with their interests on the email. The individual will put in their information to get updates from the email and then the hacker will get the information to do harm with it. Most of the time the films often contain misinformation or are exaggerated. The media can make cybersecurity look way more easy than it actually is and the time it takes is so much shorter in films than in real life. All we need to do is pick out the information that is true and false in the media so we can help the influences of cybersecurity.<\/p>\n\n\n\n<p><strong><em>Week 10 <\/em><\/strong><\/p>\n\n\n\n<p><strong>Watch this Video: <\/strong><a href=\"https:\/\/www.youtube.com\/watch?v=Zbqo7MGVElw\"><strong>Social media and cybersecurity<\/strong><\/a><strong> <\/strong><strong>Complete the <\/strong><a href=\"https:\/\/www.brieftherapyconference.com\/download\/handouts\/Tobi-Goldfus-Social-Media-Disorder-Scale.pdf\"><strong>Social Media Disorder scale<\/strong><\/a><strong>.&nbsp; How did you score?&nbsp; What do you think about the items in the scale?&nbsp; Why do you think that different patterns are found across the world?<\/strong><\/p>\n\n\n\n<p>After taking the Social Media Disorder scale, I was able to answer yes to 4 of the questions out of 9. The items of the scale were really good and also gave clarity to where these questions were coming from. I gave this out to different people to take and it was interesting seeing how many questions they answered yes to. People would like to think we aren\u2019t that glued to our phones, but we are. Different patterns could be found around the world, because some places don\u2019t have social media or they ban different social media sites. Currently the US is trying to ban TikTok, because we think it is too dangerous to have.<\/p>\n\n\n\n<p><strong><em>Week 11 <\/em><\/strong><\/p>\n\n\n\n<p><strong>Read this and write a journal entry summarizing your response to the article on social cybersecurity<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/\">https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/<\/a><\/p>\n\n\n\n<p>After reading this article it brings out a new point of view for some people. I agree with this article when it says that there is a difference between traditional and social cybersecurity. It says that traditional cybersecurity is when humans use technology to hack other technology while social cybersecurity is when humans use technology to hack other humans. It also states that one of the greatest weaknesses in any country is from the inside not on the outside. We need more people to understand what social cybersecurity is so we can protect ourselves from others that want harm to us. We need to educate everyone in our country, but our forces are the big ones that need to be aware of what social cybersecurity can do to this country if war comes to be. We now have policies in place that help with this distrust but with everything changing those will change soon enough. I agree that social cybersecurity needs to be a required discipline for the foreseeable future.<\/p>\n\n\n\n<p><strong>Watch this <\/strong><a href=\"https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0\"><strong>video<\/strong><\/a><strong>. As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors.&nbsp; Write a paragraph describing social themes that arise in the presentation.<\/strong><\/p>\n\n\n\n<p>&nbsp;In this video I learned that a cybersecurity analyst is the first line of defense and they usually monitor the network. Though this job is mostly considered an entry level job, you don\u2019t really need to have anything,but some sort of knowledge of what is going on. The social behaviors that relate to the cybersecurity analyst are all the ones we talked about in class. Systematic thinkers, they need to look at cyber as different layers in one system and they need to be able to tell the difference between each and how they impact the software. Next, we have technical and social skills, most people tend to focus on just the technical aspect and not the social part of cyber security. Civic duty, insider threats are the largest vulnerabilities in any network and it can cause irreparable damage. You need to fix this from happening whether it is doing research or just educating people. Lastly is continuous learning, since cybersecurity is changing at a rapid rate, we have to be prepared for anything to happen. All of these social behaviors relate back to the cybersecurity analyst job.<\/p>\n\n\n\n<p><strong><em>Week 12<\/em><\/strong><\/p>\n\n\n\n<p><strong>Read this <\/strong><a href=\"https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf\"><strong>https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf<\/strong><\/a><strong> sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter.<\/strong><\/p>\n\n\n\n<p>One of the economic theories that go with this letter is the Rational Choice, which means that individuals\/businesses make choices in their best interests. This business chooses to work with a cybersecurity firm so they can remove the malware in their systems. Another one could&#8217;ve been the Marxian Economic Theory, which means that someone with power exploits those without power for economic gain. The people that attacked this company would have seen that this company had many weaknesses and was weak because of this and decided to attack them to get other people&#8217;s information to get money from them. For social science theories there are many to choose from. Structural functionalism is that businesses are there as a structure for society. Another one could be just the principle Determinism, which means that behavior is learned so these people would have learned how and when to hack into this company.<\/p>\n\n\n\n<p><strong>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.&nbsp; To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.&nbsp; The policies relate to economics in that they are based on cost\/benefits principles.&nbsp; Read this article <\/strong><a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\"><strong>https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true<\/strong><\/a><strong> and write a summary reaction to the use of the policies in your journal.&nbsp; Focus primarily on the literature review and the discussion of the findings.<\/strong><\/p>\n\n\n\n<p>In this program age, code can be based on vulnerabilities that can be discovered by certain scanners. When these vulnerabilities are identified it takes a lot of time to do so, and the hacker spends&nbsp; all their time to map out all these vulnerabilities in the network of the system. Brand profiling is when the hackers hack into a really well known company so they can generate more publicity for them as a hacker. Since bug bounties have increased in popularity as of late, companies will employ cybersecurity firms to help with attacks. There are two different types of programs which are private and public programs. Public bug bounties help[ enable hackers to submit vulnerabilities and private bug bounty programs need to have a certain invitation to be able to hack and they are selected to participate if they possess certain skills to hack.<\/p>\n\n\n\n<p><strong><em>Week 13<\/em><\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/clario.co\/blog\/illegal-things-you-do-online\/\"><strong>Andriy Slynchuk<\/strong><\/a><strong> has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.<\/strong><\/p>\n\n\n\n<p>When you share passwords or addresses of any kind, there is a chance that someone will take those things and try to steal information off you. Also, don\u2019t post photos of others without having any type of consent before you post. Another serious violation is bullying or trolling on the internet. Now that people have access to smartphones and the internet all the time, cyberbullying is at an all-time high. If you get caught cyberbullying it can turn into a criminal offense, and you can have jail time. Identify fraud is when someone uses someone else&#8217;s information without the other&#8217;s permission. Another way you can fake your identity is using the incorrect age on social media or websites, which goes against the terms of use. We use other people\u2019s internet networks all the time. We can go to a restaurant, or any other place and we use their free Wi-Fi. It\u2019s illegal to use someone else\u2019s internet without their permission because it is technically stealing. Some of the things you search up can be illegal. Some examples that you can search up that can be illegal are child pornography, hiring a criminal, or like bomb-making. All these searches can land you in jail for a long time. All eleven are very serious violations that we do unknowingly online but these are my five most serious violations.<\/p>\n\n\n\n<p><strong><em>Week 15<\/em><\/strong><\/p>\n\n\n\n<p><strong>Digital Forensics | Davin Teo | TEDxHongKongSalon<\/strong><a href=\"https:\/\/www.youtube.com\/watch?v=Pf-JnQfAEew\"><strong> \u2013 YouTube<\/strong><\/a><strong> <\/strong><strong>Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker\u2019s pathway to his career.<\/strong><\/p>\n\n\n\n<p>When people think about forensic science, they will usually think about someone that\u2019s in a lab coat working inside away from people. That\u2019s partly true, they don\u2019t wear lab coats. Digital forensic is the collection of electronic data that can be used in the court of law. When he started out there wasn\u2019t a course you could take for it. It was either you fell into it, or you were put into it. When he started out, he got a job for a firm that needed an IT specialist to help with their network. When the first national digital forensics program started, he saw an opportunity and took it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Week 1 Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. There are certain areas that I would like to focus my career on, there are a few. The first one&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/trball\/journal-entries\/\">Read More<\/a><\/div>\n","protected":false},"author":27615,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/trball\/wp-json\/wp\/v2\/pages\/336"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/trball\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/trball\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/trball\/wp-json\/wp\/v2\/users\/27615"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/trball\/wp-json\/wp\/v2\/comments?post=336"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/trball\/wp-json\/wp\/v2\/pages\/336\/revisions"}],"predecessor-version":[{"id":395,"href":"https:\/\/sites.wp.odu.edu\/trball\/wp-json\/wp\/v2\/pages\/336\/revisions\/395"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/trball\/wp-json\/wp\/v2\/media?parent=336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}