Journal Entry #1- Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
There are a few areas that I would like to focus my career on as I learn more about the topic of cybersecurity. One of the areas that I find very interesting is incident response. Being able to be the first line of defense and the first people to take action during the time of an attack is very interesting to me. An area that I find to be less interesting would have to be the topic of cybersecurity legal action. The research of law and policy seems like a lot of reading and I have always been a technical person when it comes to work.
Journal Entry #2- Explain how the principles of science relate to cybersecurity.
One of the main principles of science that I know of would be the principle of determinism. Determinism is that act of making a certain decision and acting on it no matter what. Many people that hack often do it to act on something that may have happened in their past or something that may be going on in the world that they don’t agree with. With that being said people are determined in order to give themselves a voice by hacking into something and disrupting whatever that opposing side may be doing that they do not agree with in the moment.
Journal Entry #3- Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.
Privacyrights.org is a fantastic site that gives us information about every single topic when it comes to legally keeping secret information safe. Researchers can use this website when they are thinking about researching about a breach that may have happened in the country. This would give the researcher a great base on seeing if the way this information was accessed was either legal or illegal. People that also research in order to create new systems that protect our data will also need to go over the frameworks and laws that may need to be used for their innovations to make sure everything is safe.
Journal Entry #4- Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
Maslow’s hierarchy of needs can be very beneficial when you’re talking about the dependency of technology. What I can say that i relate to is the safety tier of the hierarchy pyramid. When I have my phone I can easily talk to people when I need to if I am ever in a troubling situation. People can also reach out to me if they are ever in a uncomfortable situation and are needing to either be picked up or need crucial advice about something. Staying update about what is going on in your surroundings is very important as well to me which is a great example of safety.
Journal Entry #5- Review the articles linked with each individual motive in the presentation page or Slide #4. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
The one that I rank number one would have to be political. Politics run the world and many countries have their nation state hackers in order to send a message to a country or to cripple their infrastructure. The second would have to be money. Money is what usually makes people get into hacking whether it’s ransomeware or stealing peoples payment information. The third would have to be recognition. Many hacking groups now do it for popularity in order to spread their message. The fourth would be revenge. Many people often get done wrong by a past employer and want their company to fall with them as well. The fifth would be entertainment. Many hacking groups now on social media will take down major site and post it on the internet for views and likes. Sixth would be multiple reasons. Many people often want the awareness of their actions and the money that comes with it. The last one would be boredom as there really isn’t a motive if you’re just bored.
Journal Entry #6- Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?
Websites are every easy way for people to be scammed out of their personal information in this day and age. Many people do not check the URL of the website that they are viewing. Many of these fake websites do not have the correct name in order to scam people that make typos. other ways are to make more domains under the same name but have different .org or .io tags at the end of the URL. Other sites may also capitalize on the use of completely mimicking the exact site in order to kepe the original viewers on the site in order to take the information.
Journal Entry #7- Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).
Journal Entry #8- After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity
The media has a very consistent thought about how they think cybersecurity is ran in this world. Many of these media outlets that make these movies or TV shows often portray it as an only hacking. Another part that the media tends to get wrong is how fast they think hacking works. A single hack can take hours or even days while in these movies they hack into a system within seconds. There are also many faults that they make with their story writing by getting many terms and technicalities wrong making their movie either look more exciting or understandable to a person not in the tech field.
Journal Entry #9- Complete the Social Media Disorder scaleLinks to an external site.. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
After taking the social media disorder scale I saw that I only related with 2 of the factors. When taking it, it made me realize that this country and world are addicted to the use of social media. It can consume ones life if they are not moderating their usage on these platforms that have been created. This can also make cybersecurity a lot more tricky now that everyone can be connected with social media. When using social media it is very easy to spread your information without knowing who is on the other side of the screen. this makes hacking a lot more prominent in the age of social media.
Journal Entry #10- Read this and write a journal entry summarizing your response to the article on social cybersecurity
information is the new era of warfare that is going to become the most dangerous form of power if used. Countries using information against each other will cause many governments to fall and would also send their citizens into a frenzy. without proper safeguards made by their respective national governments their citizens would be put at risk to many of their needs either being destroyed or shutdown for days at a time. critical infrastructure like water plants, hospitals and electrical grids would be a great risk if we are not ready to protect these vital systems.
Journal Entry #11- Think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
the role of being a cyber security analyst can relates a lot when it comes to viewing social behaviors. when you take on the role of cyber analyst you are responsible on studying the behavior of your employees and the characters on the outside that try to infiltrate your network. having to study your peers that work on your network is what you need to do in order to find insider threats. being a security analyst is very much dependent on the social factors that are related to your job. without knowing these factors you are putting you and the company at rock for attacks.
Journal Entry #12- Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.
Rational choice was used in this discussion as an economic theory. Them trying to find the best solution possible is quite important for them to make a full recovery. We can also used the Marxian theory as many of the people affected by this hack were people that may not have been as powerful as the people that were conducting this hack. The cybersecurity behind these attacks could literally be the reason why the victims of this attack may have their money stolen or information taken from them. These companies need to get their security together to hold up their clientele.
Journal Entry #13- A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost/benefits principles. Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site. and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
Bug bounties have been a great benefit to the people and the organizations that host these bounty challenges. In this research it stated that 60% of small business had to be shutdown after they experienced a major cyber outage. By using a proactive bounty program companies are able to spot their weaknesses and stay on track with they security safeguards. `Financially this would be great for our economy as we would have jobs staying filled and more products being made in the United States. The less companies that are closed from this epidemic would mean that more money will stay flowing in our economy.
Journal Entry #15- Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.
The overall role of a digital forensics investigator deals with social sciences more than probably any other cyber security role that is available out in the world. When you take on the role of investigator you are looking into how, why, who and when people tried to use a system illegally. The why portion is where social sciences come into play. You are trying to find the motive on why this crime was done. This touches on social sciences as you are trying to study the reasoning and background of the actions. The question of who is also a part of social sciences as you have to fit who is best to have as a suspect for the crime.