CYSE 201S Cybersecurity and the Social Sciences Journal Entries

Week 1: Journal Entry CYSE 201S Cayden Bass-Hensley

Upon examining the NICE framework, I became interested in a few career paths, which have since shaped my desired career path. I’ve made the decision to concentrate on risk management and defense when I interact with the cyberworld. Vulnerability management and cyber defense analysts seem to be the most important. All cyberspace operators who might be at risk from wrongdoers are people I want to be able to defend and safeguard. The fields with a lot of statistical work, like all-source analysis and exploration analysis, have not really piqued my interest; however, this may change as I delve deeper into my research.

Week 2: Journal Entry CYSE 201S Cayden Bass-Hensley

The seven natural science principles are fundamental to our society and are applied in our field of cybersecurity. Starting with relativism, which holds that everything is related, we can relate cybersecurity to the field of criminology in terms of creating and safeguarding our cyberspace. Similarly, with objectivity, which is defined as perceiving ideas without regard to values, we can relate cybersecurity to the idea that, in the event of a cyber incident, we must respond objectively rather than subjectively with emotionally charged decisions in order to make sound and appropriate decisions. The principle of parsimony, which states that scientists should keep their explanations as simple as possible, is one last example. Since cybersecurity problems are very complex and detailed, there is never a simple answer, so we can apply this to our field by keeping explanations of cybercrimes as simple as possible when discussing how criminals may have committed a cybercrime. This will ensure that the information is understood at a basic level. These are just a few examples of some of the principles of the natural sciences and how they can be applied to cybersecurity.

Week 3: Journal Entry 201S Cayden Bass-Hensley

I explored PrivacyRights.org, delving into the publicly available information on data breaches. This platform provides instrumental information for researchers seeking to conduct studies on cybersecurity incidents. By analyzing the details of the breaches, researchers can identify patterns, trends, and similarities, which are vital for understanding the dynamics of cyber threats. This data includes information on the types of compromised information, methods used by perpetrators, and industries most vulnerable to such breaches. The knowledge gained from these studies is invaluable for innovating more effective preventive measures, enhancing cybersecurity frameworks, and providing information on choices made to lessen the impact of data breaches on individuals and organizations.

Week 4: Journal Entry 201S Cayden Bass-Hensley

In the context of Maslow’s Hierarchy of Needs, my digital experiences showcase a noteworthy alignment with various levels of the hierarchy. Addressing foundational physical needs, technology serves as a tool for acquiring sustenance and resources, allowing for the online purchase of food and water. Additionally, technological applications extend to fulfilling safety needs, offering control over environmental factors such as adjusting temperatures and managing security systems through mobile devices. Moving up the hierarchy, technology becomes instrumental in meeting social needs, as platforms like social media facilitate connectivity with family and friends, fostering a sense of belonging and support. For esteem needs, individuals use technology to showcase accomplishments and prowess, earning recognition and celebration. Finally, in the pursuit of self-actualization, technology plays a role in goal tracking across various domains, including career, fitness, and education. This alignment highlights the multifaceted benefits of technology, integrating with diverse human needs in contrast with Maslow’s hierarchy.

Week 5: Journal Entry 201S Cayden Bass-Hensley

Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you do.

1. For money: This ranks highest because money is a powerful motivator for many people. Cybercriminals see the potential for big profits, which drives a lot of their actions.

2. Revenge: Revenge is a strong emotion, and when people feel wronged, they sometimes turn to cyber means to get back at others. It’s a personal motive that can lead to significant harm.

3. Political: People who are passionate about certain causes may use hacking as a way to express their political viewpoints. They want to make a statement and push their agenda forward, which can have far-reaching consequences.

4. Entertainment: Some people find hacking and cyberspace entertaining. They might do it out of curiosity or just for entertainment, without realizing the potential harm they’re causing.

5. Recognition: Some hackers are in it for the recognition. They want to show off their skills and be recognized for their abilities. While it’s not as serious as other motives, it still drives some people to engage in cyber activities.

6. Multiple reasons: Multiple reasons rank lower because it’s kind of a fit-all category. People might have a mix of motives driving their actions, which can make it hard to identify their true intentions.

7. Boredom: Boredom is a weak motive compared to the others. While it might lead some people to engage in cyber activities, it’s usually not the driving force behind serious cybercrimes.

Week 6: Journal Entry 201S Cayden Bass-Hensley

SHOWCASE WHAT MAKES FAKE WEBSITES FAKE

In this paragraph, I will examine 3 main points that contribute to correctly identifying what makes a website fake. Fake websites often use URLs that try to imitate the real brand with small changes, such as substituting letters with numbers or adding extra characters, making them appear real at first, but once you actually look, you can identify these flaws. Secondly, these websites may contain obvious spelling and grammar errors throughout their content, from minor typos to evident grammatical mistakes. Also, the absence of genuine customer reviews and feedback is a common identifier of fake websites, as they lack any form of real user content or only display fake reviews that overly praise the site, signaling a false webpage. These characteristics all contribute to the deceptive nature of fake websites. It is crucial for users to carefully examine websites before engaging with them to avoid falling victim to online scams.

Week 7: Journal Entry 201S Cayden Bass-Hensley

Meme Creation

https://unsplash.com/photos/brown-and-white-long-coated-small-dog-wearing-eyeglasses-on-black-laptop-computer-gySMaocSdqs Meme: “When trying to create a strong password but the website says its too weak.”

https://unsplash.com/photos/person-sitting-front-of-laptop-mfB1B1s4sMc Meme- “When you get a 2-factor authentication notification knowing that it wasn’t you and your information is protected.”

https://unsplash.com/photos/person-sitting-front-of-laptop-mfB1B1s4sMc Meme- “When you don’t remember to update your antivirus and firewall programs after hearing about the multitude of data breaches this week,”

Conclusion:

These memes effectively capture the human aspect of cybersecurity by illustrating relatable scenarios, emotions, and behaviors individuals encounter while safeguarding from cyber threats. They underscore the importance of user awareness, informed decision-making, and proactive measures in maintaining cybersecurity sustainability at a personal level.

Week 8: Journal Entry 201S Cayden Bass-Hensley


The media has a big say in how we see cybersecurity. It’s our go-to for learning about cyber threats and how to stay safe online. They might exaggerate things or simplify stuff too much, which messes with how we understand the real risks. Plus, they can make us feel either super scared or way too relaxed about cyber threats, depending on how they spin the story. What the media says about cybersecurity also affects what laws are made and how governments respond. They pay attention to what people think, which means media coverage can shape policies and rules about cybersecurity. But the media’s take isn’t always balanced. They have deadlines and pressure to make stories exciting, so they might miss some important details or focus on the wrong stuff. That’s why it’s crucial for us to think critically about what we hear and read. We’ve got to check different sources, listen to experts, and not take everything at face value. We will be able to make more informed decisions about how to keep our belongings and ourselves secure online and have a better understanding of what is actually happening in the digital world.

Week 9: Journal Entry 201S Cayden Bass-Hensley

Social Media Disorder Scale (SMD Scale) Please answer the question by thinking of your experience with using social media (e.g., WhatsApp, Snap Chat, Instagram, Twitter, Facebook, Google+, Pinterest, forums, weblogs) in the past year. Answer the questions as honestly as possible. According to DSM, at least five (out of the nine) criteria must be met for a formal diagnosis of “disordered social media user”. During the past year, have you

1. Have you regularly found that you can’t think of anything else but the moment you will be able to use social media again? Yes/No (Preoccupation). NO

2. Have you regularly felt dissatisfied because you want to spend more time on social media? Yes/No (Tolerance). NO

3. Have you ever felt bad when you could not use social media? Yes/No (Withdrawal). NO

4. Have you tried to spend less time on social media but failed? Yes/No (Persistence). YES

5. Have you regularly neglected other activities (i.e., hobbies, sports, homework) because you wanted to use social media? Yes/No (Displacement). NO

6. Have you regularly had arguments with others because of your social media use? Yes/No (Problems). NO

7. Have you regularly told your parents or friends about the amount of time you spend on social media? Yes/No (Deception). YES

8. Do you often use social media to escape from negative feelings? Yes/No (Escape). NO

9. Had serious conflict with your parents, brother, or sister (friends, relationships, etc.) because of your social media use? Yes/No (Conflict). NO

I think the items on the scale are very concise as to making a judgment about social media disorder. Different patterns of social media use and its impacts can be found across the world due to a variety of factors, including cultural differences, access to technology, and individual psychological factors.

Week 11- Journal Entry 10 201s Cayden Bass-Hensley


After reading the article on social cybersecurity, I’m struck by how complex this field has become. It’s not just about protecting technology anymore but it’s about safeguarding our society from manipulation and influence, which feels like a very exhausting task. The article really drives home the point that cybersecurity isn’t just a tech issue but it’s deeply intertwined with human behavior and society. It stresses the importance of keeping our information environment open and free from manipulation, which makes a lot of sense when you think about how easily technology can influence public opinion. I found the discussion on bots and cyborgs manipulating people and communities very interesting. It shows how interconnected social cybersecurity is, pulling from political science, sociology, and more to take on the challenges of our digital world. The part about information warfare and the need for a coordinated effort to combat strikes a thought in me. It’s like a wake up call that our battles aren’t just happening on physical fronts anymore they’re happening online, and we need to adapt our strategies.

Week 11- Journal Entry 11 201s Cayden Bass-Hensley

Working with technology is only one aspect of being a cybersecurity analyst; another is knowing people. They are a hybrid of educators, tech specialists, and leaders for their companies. They have to patch vulnerabilities and implement security measures, they also have to ensure that everyone in the organization understands the importance of online safety and abides by the policies. It’s not just about sitting behind a computer screen all day; cybersecurity analysts have to work with different companies. They have to be able to explain things in simple terms to people who aren’t tech savvy and help the company prepare for any security complications. Its all about implementing tech skills with people skills to keep everyone and systems safe from cyberattacks.

Week 12- Journal Entry 12 201s Cayden Bass-Hensley

In the letter about the security breach on www.glasswasherparts.com, we can see how two economic theories come into play: Information Asymmetry Theory and Cost-Benefit Analysis. Information Asymmetry Theory is like when the company had more information about the breach than its customers, which can mess up how the market works. ⁤⁤Cost-Benefit Analysis is all about the company deciding whether it’s worth spending money on stuff like investigating the breach and telling customers about it, compared to the benefits of avoiding potential damage. ⁤

⁤From a social sciences perspective, we can think about Trust Theory and Social Exchange Theory. ⁤⁤Trust Theory is really important here because the breach might make customers question how much they can trust the company to keep their information safe. ⁤⁤Social Exchange Theory is like how customers might think about whether it’s worth sticking with the company after the breach, considering what they’re getting out of the relationship versus any risks or downsides. ⁤

Week 13 – Journal Entry 14 201s Cayden Bass-Hensley

There are things that, in the big, wide world of the internet, while initially appearing harmless or even helpful, can turn illegal. Out of the eleven activities that are highlighted, five are particularly serious because they have the potential to cause harm, violate privacy, and violate copyright laws.

Firstly, using unofficial streaming services is strongly discouraged. When content is distributed on these platforms without the owners’ consent, copyright laws are frequently broken. This not only denies creators their just compensation, but it also puts users at risk of downloading malicious content that could damage their devices or expose their personal data.

Second, it is unethical and illegal to use torrent services to download pirated versions of music, movies, and other copyrighted content. This puts users at risk of downloading malware or other dangerous files in addition to depriving content creators of their due compensation.

Thirdly, it is illegal to use photographs that are protected by copyright without the owner’s consent. Legal action and financial penalties may result from the use of images for personal and commercial purposes.

Fourth, without permission, sharing someone else’s password, address, or photo is prohibited and can have major repercussions, such as identity theft and invasion of privacy. Because it has the potential to seriously harm people and their families, this activity is especially concerning.

Lastly, recording a VoIP call without consent is illegal and infringes on the privacy rights of individuals. If the recording is used maliciously, this infringement may result in legal action.

Week 15 – Journal Entry 15 201s Cayden Bass-Hensley

As described in his TEDxHongKongSalon talk, Davin Teo’s path into digital forensics shows the connections between different academic disciplines and the surprising professional paths that can lead to satisfying jobs. Teo’s interest in digital forensics spurred while he was pursuing a degree in social sciences, and he shows how education can lead to a job in an apparently unrelated field. His commitment and determination in overcoming obstacles to pursue his love for digital forensics is admirable. This journey of Davin Teo not only emphasizes the value of digital forensics in the modern world, but it also shows how a proper education may lead to unexpected job opportunities.

Teo’s story is a reminder that the path to a fulfilling career can be filled with ups and downs and isn’t always what we plan for. It’s a testament to the idea that passion and curiosity can lead us down paths we might not have initially considered. His journey also highlights the value of a broad educational path with insights from various disciplines. It provides the flexibility to explore various fields and discover one’s true passion. This story serves as a powerful reminder that, while traditional career paths are important, the most rewarding careers often come from following our passion, no matter where it may lead us.

Leave a Reply

Your email address will not be published. Required fields are marked *