{"id":291,"date":"2024-09-19T03:44:08","date_gmt":"2024-09-19T03:44:08","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/trentonpicott-0\/?page_id=291"},"modified":"2024-12-09T00:18:59","modified_gmt":"2024-12-09T00:18:59","slug":"journal-entries","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/trentonpicott-0\/journal-entries\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><strong>Journal 1<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">After looking over the different career options I feel that the career that stuck out to me the most is digital evidence analysis. This is because my major is cybercrime. This job involves an analysis of digital evidence as well as preserving this evidence.&nbsp; This evidence could potentially be used during court. There are thousands of incidents of cybercrimes committed by criminals everyday. These incidents can potentially affect things like businesses and people&#8217;s personal lives as well. The job that&#8217;s least interesting to me is the cybersecurity instructor. I would not want to teach college students at all. If I needed to teach, I would rather teach people who have already passed a job at the place I&#8217;m working at. I feel if I&#8217;m teaching to help my company or team then I would be more interested in doing that.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Journal 2<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">When thinking about the principles of science and how they relate to cybersecurity it&#8217;s pretty simple. Science relies on &nbsp;gathering data and using that data for a hypothesis. Just as cybersecurity relies on testing different systems and their vulnerabilities against attacks or hacking to ensure a good security. When comparing cybersecurity to the scientific method the observation or gathering of evidence is very important. &nbsp;This works especially when cybersecurity specialists are doing practice attacks on systems that they are trying to improve their security on. This helps them find holes and patch them before real hackers take advantage of it. Another example is the practice or experiment it&#8217;s self. This helps generate the a hypothesis or a solution for the problem.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Journal 3<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Researchers might find the information on this website very useful. This website offers a good amount of information related to data breaches. Specifically in the data breach chronology section had information listed like hacking incidents. It has hacking incidents listed by different business sectors. This information is useful to researchers because they show which sectors are most affected. They can study this and gain better knowledge on how to stop the incident as well as why they are happening. It also provides information on the different methods that are used to hack and expose data. Learning this information can potentially stop breaches from occurring in the future.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Journal entry 4<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">When talking about self-actualization, it is the process of realizing one&#8217;s potential. When thinking about technology relates to that and me. I can use my major and college as an example online classes and all of the things that I\u2019m being taught about technology can help reach my full potential. Self-esteem also relates to my career. Things like indeed and linkedin create places to show off your resume and accomplishments while also giving you a place to create a career path. Instagram also falls in the love and belonging category. As it generates a sense of connection with friends and family. For safety needs technology has things like two step verification which creates a barrier of protection to keep things like personal information safe. Technology and physiological needs ratetes to things like shopping. Buying things like clothes and food online creates a place where physiological needs can be met.\u00a0\u00a0<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Journal entry 5 <\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">I think that Money is the number one reason that makes the most sense for cyber crimes. The internet is very profitable and with the knowledge that these hackers have it&#8217;s easy to get money with it. I think that reason number two is political. This is due to the newer generations&#8217; of hackers curious about everything going on in the modern day world. Revenge is the third reason as it may be many reasons to cause the urge for revenge. If someone wants revenge and hacks this can be emotionally driven and cause them to make the most of the opportunity and expose a lot of things.Recognition is the fourth reason because some people or organizations may use their cyber knowledge and commit cyber crimes so that they can win an election or vote. Boredom is the fifth reason because people can become bored and start committing cyber crimes. Entertainment is the sixth reason because people may find it entertaining to hack and leak information. Multiple reasons is seventh as these reasons really come from the other ones that are higher in the list.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Journal entry 6<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">The first example of a fake website is \u201cChas3bank-login.com\u201d. This is a fake website attempting<br>to represent a real one. The real website example would be \u201cChase.com\u201d which is an official<br>domain. Another example of a fake website is \u201cFreeIphones223.org\u201d. This deal is unrealistic and<br>while exploring the website you may see offers but not any real contact information so that you<br>can purchase. \u201cApple.com\u201d is an example of an official website with real contact information as<br>well as an official domain. Finally, \u201cAmaz0n-discount.net\u201d shows a website that&#8217;s imitating the<br>popular store amazon. This is fake because the name of the site itself uses a different domain.<br>On the other hand \u201cAmazon.com\u201d is a website with an official domain and is secure. The<br>website is also attempting to get people to click it as it poses to offer a discount on products.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Journal entry 7<\/strong> <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXenDt5llast3ODPj2DokG2roxrxQ77m5HcshEpm3NpOuoXC1UAMKugcokMKDJYcyvhItAEFWCb6DIz7DlcdyVfHA7LD3dCDA6lpAzeARP65lXUBQqjNwRY5X6RC_pYOc4xghw0_-q3bMBnHk0SfK7HxEqg?key=UXDh94uPvfTz0evMVSAMvw\" alt=\"\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXdemLDIl897JkvxO53v91GyhngYoANx3jEywc8X4usdn-U8pTJW9LP2wGfjmcluVfOeu2BtfAa_UQm2757RwG4m4df8nywfCXV23DcRYuScnIXHXNpSJyu5ah5hD4oDCeZYrvi_3jHxCur2e5Zn6okMTLem?key=UXDh94uPvfTz0evMVSAMvw\" alt=\"\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXeI7yv9G7w1B4cmm5W1CABLh8USvZPchWvL22tToqywJkLWU75-1yoGm08FjWoBighyZlUZIg5DyIhMsC1yTRtwAommAur9aO21WWEpSTTCdYE-8CWi5mI-xTemgG_jZ_LQdid11Mn0iTkPYDwal9EODJI?key=UXDh94uPvfTz0evMVSAMvw\" alt=\"\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">In the first image when thinking about human-centered cybersecurity falls in line perfectly. In the picture you see a group of people all of them have laptops out and are working. Some people in the photo look as if they are working hard on an assignment or task. While there are others that are focused. In the second picture there is someone who is on their laptop. As I cannot see their faces to tell their emotions, it seems that they are working hard to complete some sort of task. In the third picture the user is happy and excited to be working with his computer.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Journal entry 8<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">The media has different influences on our understanding of cybersecurity. Starting with\u00a0 a negative effect like the example in the video the term \u201comega site\u201d in the first movie. This is a made up term to add an exaggerated effect in the movie compared to reality. This can have a negative effect due to it making cybersecurity seem more complicated than it really is. This can make people more scared or worried to join the field and with the future of technology people in this field are needed. The second movie shows real life capture the flag activities that happen in real life. This is positive and shows the way a capture the flag activity may go.\u00a0<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Journal entry 9<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">The SMD scale quantifies symptoms of problematic social media use, such as preoccupation, tolerance, withdrawal, and conflict in daily life. After completing it, my score was in the moderate range.This is suggesting that I use social media regularly but it doesn&#8217;t create a big disturbance in my life. Items on this scale are relevant including using social media to temporarily escape from negative feelings and failing to fulfill responsibilities. This may not deal with the cultural nuances of this influence in social media usage. Whereas cultural, economic, and social factors around technology shape different patterns around the world. For example social media might be used in some cultures for connection and communication , while in other cultures, the focus is more on personal expression.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Journal entry 10<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">The article &#8220;Social Cybersecurity&#8221; sheds light on the fact that today&#8217;s cybersecurity and how it<br>extends way beyond technology.The article describes an effort to protect against social<br>manipulation techniques that can rupture communities and change the behavior of people. It<br>covers &#8220;social cybersecurity,&#8221; which is the integration of cybersecurity and different social<br>science methods that help make sure to reduce the impact of disinformation campaigns. These<br>campaigns are mostly conducted through social media-that can elicit emotions, polarize<br>sentiment, and create social tension. This article also suggests network science as a way of<br>detecting patterns of misinformation by deploying counter narratives and underlines the need for<br>raising public awareness and building resistance against such threats.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Journal entry 11<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">This position of a cybersecurity analyst largely concerns social behaviors, which implies understanding, prediction, and mitigation of human activities in the digital domain. Such work should be based on a deep understanding of how individuals and groups interact with technology, from risk propensity and trust in online communications to responding to cybersecurity policies. Among the key cyber threats, social engineering remains important because of the psychological manipulative means of exploitation of human frailties. Also, cybersecurity analysts often work with diverse groups and communicate on the effective establishment of threats well to develop awareness and compliance among people. The above-mentioned social issues reveal an interrelated dynamic between technology and individual human conduct regarding safety in digital media.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Journal entry 12<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">The two economic theories and two social science theories accordingly provide insight into the context of this &#8220;Sample Data Breach Notification&#8221; letter. First, in economics, Cost-Benefit Analysis grants reason to the notification of trying to minimize the costs related to identity theft by advising customers to take precautionary measures.Agency Theory applies since the company&#8217;s platform provider acted on behalf of the company but failed, which highlights the economic risks in relying on third-party services. From this social science perspective, Social Contract Theory forms the basis of the company&#8217;s ethical obligation to notify customers in case of a data breach to preserve trust. Risk Society Theory also explains further that, as such, it forms one means of responding to novel risks and assuages public anxieties about the threat from cyber_Space.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Journal  entry 13<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Bug bounty policies are designed to take advantage of hackers in finding vulnerabilities in cybersecurity, while the rewards are dictated by cost-benefit analysis. In the review of literature, it is reviewed that these economically grounded programs balance the cost of possible vulnerabilities against the expenses involved in rewarding hackers for the findings of the program. Various findings show that such programs can reduce the risks of security; however, for preventing misuse and providing incentives, well-defined structures are required or must be developed. Review: Finally, bug bounties underline how they can work effectively, if well-regulated, in complementing broader cybersecurity frameworks for the betterment of the security of overall infrastructures.\u00a0<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Journal entry 14<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Andriy Slynchuk mentions various illegal activities common among the users of the Internet; the\u00a0 five different serious offenses include identity theft, hacking, sharing of copyrighted materials, malware dissemination, and harassment through the internet. While identity theft and hacking can be extremely devastating for the financial and emotional aspects of any person, often disturbing the normal livelihood of such a person, distribution of copyrighted materials seriously violates the rights of ownership and creators in an industry. The malware destroys devices and compromises sensitive data creating massive risks for individuals and organizations. Online harassment may give rise to psychological disorders and may even further lead to self-inflicted harm or more serious consequences. The offenses committed are serious in nature, as committed in contravention of the law, causing hurt to persons, entities, and society as a whole.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Journal entry 15<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Interesting was his career path, pretty much linked to social sciences. Digital forensics is not all about technical skills, in essence a great deal of understanding human behavior, psychology, and communication are required, which happen to be the key areas constituting social sciences. Davin&#8217;s journey into this field underlines the need for adaptability and interdisciplinary learning. He elaborated further that knowing the &#8220;why&#8221; of people&#8217;s actions is as important as finding out the &#8220;how.&#8221; The ability to interpret the digital evidence while explaining the motive of humans shows the fusion of technology with social sciences. I admire how his career brings together critical thinking, ethical reasoning, and problem-solving skills to illustrate the ways in which graduates of the social sciences can be highly successful in a technology-driven field by applying their knowledge of societal patterns and human dynamics. This talk inspires me to pursue various career choices that bridge disciplines.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal 1 After looking over the different career options I feel that the career that stuck out to me the most is digital evidence analysis. This is because my major is cybercrime. This job involves an analysis of digital evidence as well as preserving this evidence.&nbsp; This evidence could potentially be used during court. There&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/trentonpicott-0\/journal-entries\/\">Read More<\/a><\/div>\n","protected":false},"author":25987,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/trentonpicott-0\/wp-json\/wp\/v2\/pages\/291"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/trentonpicott-0\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/trentonpicott-0\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/trentonpicott-0\/wp-json\/wp\/v2\/users\/25987"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/trentonpicott-0\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/trentonpicott-0\/wp-json\/wp\/v2\/pages\/291\/revisions"}],"predecessor-version":[{"id":316,"href":"https:\/\/sites.wp.odu.edu\/trentonpicott-0\/wp-json\/wp\/v2\/pages\/291\/revisions\/316"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/trentonpicott-0\/wp-json\/wp\/v2\/media?parent=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}