Journal Entry # 1 –

The least interesting field that I would want to work in would be investigation. From what I have seen working for the Government the folks that have to do investigations tend to do a lot of paperwork. I am not big on having to fill out tons of paperwork and forms when other people mess up. Also, your hours can be crazy depending on if the company you work for is 24/7 or not. I also am not big on traveling, and some of these investigator jobs can have you traveling a lot of the time. Now I know it is an important job, just not one I am personally interested in. I am interested in Implementation and Operation. I would like to do system administration or network operations. I enjoy maintaining systems and working/troubleshooting network devices and issues.

Journal Entry # 2 –

The principle of Empiricism enhances the effectiveness of cybersecurity practices by using proven knowledge, data gathering and testing systems to effectively fix security issues and prevent issues from happening. Using this principle will allow someone to compare their system or systems to the current security standards.  This will help keep it secure as well  as be able to fix any security issues properly according to what is published as the most up to date and correct. Research, testing and gathering of data will also allow strategies and further development of security implementation to be created based on what is happening in the cyber field.

Journal Entry # 3 –

Privacyrights.org provides valuable data for researchers to help them forecast future data breaches and trends. It covers laws, policies, actual breaches, and tons of other articles that are good research material. The database provides detailed information such as breach type, the organization affected, location, and number of records exposed. This allows researchers to track trends in each organization and location based off the severity and frequency of breaches. Thus, being able to predict potential breaches before they occur based off the data gathered on this site. The data gathered may not be exact but used correctly can still be a strong tool for research purposes and forecasting breaches in the future.

Journal Entry # 4 –

How Maslow’s Hierarchy of Needs relates to my experiences with technology:

Physiological needs: For this need I have worked in network infrastructure and as a systems administrator. These roles have allowed me to keep people connected to the network and perform their daily jobs so that they could do the things they needed to complete.

Safety needs: Since employees would be able to do their job this would allow them to get a paycheck and take care of themselves and whatever else in their life. The same would go for me, since without doing my job, I wouldn’t be able to take care of and provide for my family.

Love and Belonging: Working in IT has helped me start a family and have two beautiful kids. It has also helped me make friends for life and have a sense of belonging with the people I have worked so closely with.

Esteem: I have focused on getting the job done and let the achievements from it come naturally. I started as an IT in the Navy and just worked hard. This allowed me to get a job in network infrastructure when I transitioned out. Then after doing that for some time, I was able to continue moving up in my career and work as a system/network administrator.

Journal Entry # 5 –

  1. Money

To me if you are going to commit a crime there should be a good reason for it. You shouldn’t do it but at least have a reason. So doing it for a better life finically or paying for bills and groceries isn’t the worst reason.

  • Recognition

So, recognition isn’t a bad reason when doing it like the hacker did against NASA. It helped them see these vulnerabilities and even thanked them. This is an example of good recognition, unlike the British hacker who did it for twitter likes.

  • Multiple Reasons

Since these reasons can be a mix of money, recognition and other things from this list it isn’t the worst on here. It usually also isn’t rooted in a completely selfish motivation. 

  • Political

This is the part where I am choosing based on what isn’t too bad since the rest of the motives aren’t good reasons. Political can have its reasons based off what government backed group is involved and why. If it is beneficial to the US I can lean towards agreeing with it more but if not, then I won’t. I also disagree with smearing another’s image.

  • Curiosity

When it goes too far like it did with Johnathon’s story I cannot agree with curiosity as motivation. In some capacity it can be a way to learn and even let a company know of potential weaknesses. But when you cost a facility millions and then it spirals from there it isn’t worth doing it.

  • Revenge

Revenge is a bad motive for me because it shows the ugly side of humanity. Especially based on the articles. Putting videos and images out there because of revenge is gross, especially since the victims trusted that wouldn’t happen. As well as deleting irreplaceable photos and videos out of revenge.

  • Boredom

The last two are almost self-explanatory. Hacking from boredom is dumb and a waste of time. Committing crimes because you are bored is something that should never be done.

  • Entertainment

Like boredom this is not a good motivator. Hacking shouldn’t be don, at least in an illegal sense, especially because someone wants a little entertainment in their lives. Read a book, exercise, play a game, watch TV, etc. Don’t hack.

Journal Entry # 6 –

Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source].

Compare the three fake websites to three real websites and highlight the features and similarities that identify each fake website as fraudulent.

Real Website #1 – https://www.apple.com/support/

Fake Website #1 – http://appletirepaircenter.com/

They look similar but the fake website is a http not https, the spelling on it is incorrect if you take the time to read it, and apple has a /support after the .com, while the fake website makes it seem the support is its own site.

Real Website #2 – https://www.instagram.com/accounts/login/

Fake Website #2 – https://instagrom.com/login_redirect

Instagram is misspelled in the fake website; it uses an o which is like an a so if one isn’t paying close attention, it could trick them.

 Real Website #3 – https://www.fedex.com/en-us/tracking.html

Fake Website #3 – https://www.fedex-delivery-hold.us/

 The fake website ends is .us and not .com and having delivery hold creates a sense of urgency for the person trying to find the correct URL. Also, if this was sent in an email the person receiving it may click on it because of the wording of the link.

Whenever looking for a website or receiving a URL in an email verify that the structure of it makes sense. Verify the URL has HTTPS in the beginning, that it is spelled correctly, and that the sender of the email is legit. There are also websites you can use to check the integrity of a link if you are unsure.

Sources:

https://www.identityguard.com/news/how-to-tell-if-a-website-is-fake

https://www.arcyber.army.mil/Resources/Fact-Sheets/Article/3301745/fraudulent-websites/