Module 10 Entry

The article on social cybersecurity details the different types of social cybersecurity attacks and outlines what we need to do to defend against them. There are different types of social cybersecurity maneuvers to look out for, such as information and network maneuvers. The information maneuver is done by manipulation of information and the flow or relevance of information. Tools used in this maneuver are misdirection, hashtag latching, smoke screening, and thread jacking. The network maneuver is the manipulation of the actual network. Tools used in network manipulation are opinion leader co-opting, community building, community bridging, and false generalized other. These types of attacks are being used on societies to weaken them so an adversary can easily defeat them. They do this by getting society to crumble from within, creating distrust and chaos in their society. The article also explains how bots can help do this at a much larger and faster scale. In conclusion, it talks about how military leaders and the D.O.D. need to understand these types of attacks and look out for them within their authority while educating the public about them indirectly. It must be done ethically and quickly. We also need to develop policies to help defend against them and seek to remove any wedge of distrust between our military and society.

Facebooktwitterlinkedininstagramflickrfoursquaremail

Module 9 Entry

My social media disorder score was 0. I think the items on the scale are relevant and can help people identify if they have a problem, but only if they are honest with themselves because people can lie to themselves, refuse to see the problem, and not change. I believe different patterns are seen worldwide because of location and access to technology or the internet. Some places cannot get internet, and some areas are in poverty, unable to access social media, or it makes it hard for people to become addicted to something they cannot access. Also, in areas where many people can access it, the numbers can vary depending on situations, how people were raised or what beliefs they may have. So, patterns around the world can be very different when it comes to social media.

Facebooktwitterlinkedininstagramflickrfoursquaremail

Module 8 Entry

After watching the video, I think the media shows that hacking is cool and something only brilliant people can do. In reality, almost anyone can hack. Some media also shows how scary it can be if it were to happen in real life. Most of the things that were rated in the video were pretty realistic. Some things were just Holly Wood trying to make the scene look better. I think the media tries to show hacking as fun and that everyone should do it when, in reality, it’s dangerous and mostly illegal. The fact that some of these shows were realistic makes them more attractive. It also helps pull people into the Cyber Security field.

Facebooktwitterlinkedininstagramflickrfoursquaremail

Module 7 Entry

When you have to work but you’re stuck at home.
When you finally found a good Wi-Fi connection.
When your thirsty but have work to do.
When you can connect to family from anywhere.
When it’s so easy your dog can do it.
When you cannot decide on a background picture.
When talking isn’t enough.
I.T. at work.
When everyone forgets it’s a Zoom meeting.
When trying to capture the right moment.

My memes relate to human systems integration because everything captured in these memes is done with technology and system integration with humans. This technology lets people take pictures or do their jobs in any environment and allows people to interact no matter where they are.

Facebooktwitterlinkedininstagramflickrfoursquaremail

Article Review 2

My review of the article “I Can be a Super Sleuth: Promising Practices of Engaging Adolescent Girls in Cybersecurity Education” points out why there are not many girls in the cybersecurity field. The study shows some of the reasons why girls are not engaged in the cybersecurity field. It is basically the same reason girls are not usually into video games. It is stereotypically viewed as nerdy and nonsocial. It also explains the need for women in cyber security and how diversity is essential so every avenue of cyber security can be implemented. Since there are so few females in the cyber security field, girls lack role models that help get them interested in computer science careers. Studies have shown that girls have lowered feelings of belonging in the computer science field; as a result, very few women seek a career in computer science. In class, we have discussed that women were less inclined to be in a computer science field due to certain factors, mainly that they have a disinterest in them for one reason or another and this article’s studies support that. They also found that in cyber security, there were misconceptions about who is entitled to participate. This acted as a barrier for women to get into the cybersecurity field. They also found out they had almost no data about what adolescent girls perceived of the cybersecurity Field. So, they had a study for just 38 adolescent girls to help research that answers two questions how girls perceive cybersecurity and what practices can engage girls in cybersecurity. They also found that girls blame their lack of ability and self-efficacy for not going into the field. These reasons are why girls would withdraw from the field. They also found out that girls enjoy puzzles and solving real-world problems. Because of this, girls can be interested in computer forensics. The study of the 38 girls was done in a summer program, and it went over cyber security basics and had teachers that took their time with each individual student to help them understand the material. As a result, the girls enjoyed working on the cyber security assignments and said they would not mind a career in the cyber security field. So, the study showed that having good teachers and the class is only for girls helped raise girls’ interest in the subject because they did not feel intimidated by boys. After all, there were none. The teachers were patient with them and made them feel comfortable with the material, and they didn’t have the feeling of being pushed down or overshadowed like they would in a co-ed setting. So, eliminating some stereotypes could help more girls choose to be in cyber security. The studies also mention that there needs to be more studies on girls with no prior interest in computer science. These studies could help fill the gender gaps in cyber security. I think this article hits on key points, and they need to find better ways not just to get girls interested in the field but have a way, so boys don’t give girls a feeling of being pushed down or overshadowed.

Facebooktwitterlinkedininstagramflickrfoursquaremail