{"id":13,"date":"2025-02-01T16:49:14","date_gmt":"2025-02-01T16:49:14","guid":{"rendered":"https:\/\/student.wp.odu.edu\/cdard004\/?page_id=13"},"modified":"2025-04-27T18:25:23","modified_gmt":"2025-04-27T18:25:23","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/cdard004\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Journal Entries<\/h2>\n\n\n\n<p>Journal Entry #1 <\/p>\n\n\n\n<p>Workforce Framework for Cybersecurity (NICE Framework) | NICCS (cisa.gov)<br>After reviewing the NICE Workforce Framework for Cybersecurity, I would be interested<br>in \u201cSecurely Provision\u201d category, particularly roles focused on Risk Management and<br>Systems Architecture. These areas align closely with my current experience as an<br>Information System Security Officer (ISSO) and my studies in cybersecurity. I currently<br>use systems and implementing strategies to mitigate potential threats, which this<br>category emphasizes.<br>What I would least be interested in is \u201cOperate and Maintain\u201d category, specifically<br>positions like Network Operations. While important, I prefer strategic and design oriented tasks. By focusing on risk assessment and security architecture, I aim to<br>strengthen my expertise in critical, high-level decision-making roles that shape<br>cybersecurity policies and frameworks.<\/p>\n\n\n\n<p>Journal Entry #2<br>The principles of science, including empiricism, determinism, parsimony, and objectivity, are<br>essential to cybersecurity. Empiricism ensures that decisions are grounded in real-world<br>evidence, such as analyzing data from breaches or identifying vulnerabilities. Determinism<br>shows how specific actions or events, like poor password practices, can lead to predictable<br>outcomes, enabling proactive prevention. Parsimony reminds us to keep security systems as<br>simple as possible to reduce errors and make them more user-friendly. Finally, objectivity helps<br>cybersecurity professionals make unbiased decisions, focusing on facts rather than assumptions.<br>By applying these principles, organizations can develop effective security strategies that address<br>threats while staying adaptable to changes.<\/p>\n\n\n\n<p>Journal Entry #3<\/p>\n\n\n\n<p>PrivacyRights.org provides vital information on data breaches, including the nature of the<br>breach, the affected entities, and the compromised data types. Researchers can utilize this<br>database to identify patterns in cyberattacks, such as which industries are most frequently<br>targeted and what types of data are at greatest risk. Analyzing this data enables researchers to<br>evaluate how specific security failures occur and to explore trends in attack methods over time.<br>Furthermore, the site offers insight into how organizations respond to breaches, which can<br>inform studies on the effectiveness of incident response strategies. By leveraging this<br>information, researchers can propose actionable solutions to enhance cybersecurity resilience and<br>better protect sensitive information.<\/p>\n\n\n\n<p>Journal Entry #4<\/p>\n\n\n\n<p>Maslow\u2019s Hierarchy of Needs connects to technology in my life. At the physiological level, I rely on technology for food delivery apps and health monitoring devices on my apple watch when I am exercising. For safety needs, cybersecurity tools and two-factor authentication protect my personal data. Social media and messaging apps fulfill my belongingness needs by helping me maintain relationships and stay connected with family and friends. The esteem level is supported through professional achievements shared on LinkedIn. Lastly, self-actualization is enhanced by learning platforms like YouTube, where I develop new skills and explore my interests. Technology shapes and fulfills needs at every level, blending seamlessly into daily life.\u00a0<\/p>\n\n\n\n<p>Journal Entry #5<\/p>\n\n\n\n<ol>\n<li>For Money \u2013 Cybercriminals often prioritize financial gain, making this the most<br>logical motive. From ransomware attacks to credit card fraud, monetary rewards drive a<br>large portion of cybercrime.<\/li>\n\n\n\n<li>Recognition \u2013 Some hackers seek fame or respect within their communities, pushing<br>them to engage in high-profile cyberattacks.<\/li>\n\n\n\n<li>Political \u2013 Hacktivism is a powerful force, with groups targeting organizations or<br>governments to promote ideological beliefs.<\/li>\n\n\n\n<li>Revenge \u2013 Personal grudges can lead individuals to commit cybercrimes, such as<br>leaking private data or launching attacks against former employers.<\/li>\n\n\n\n<li>Multiple Reasons \u2013 Many offenders are driven by a mix of motives, making this<br>category important but less defined.<\/li>\n\n\n\n<li>Entertainment \u2013 Some people hack for the thrill, though this motive feels less<br>justifiable than financial or ideological ones.<\/li>\n\n\n\n<li>Boredom \u2013 While some engage in cybercrime out of boredom, it seems like the<br>weakest and least compelling reason.<\/li>\n<\/ol>\n\n\n\n<p>Journal Entry #6<\/p>\n\n\n\n<p>Week 6 &#8211; Journal Entry: Spotting Fake Websites<br>While researching fake websites, I was surprised at how realistic some of them look. I<br>found three examples of fraudulent websites and compared them to their real<br>counterparts, noticing key differences that can help identify scams.<\/p>\n\n\n\n<ol>\n<li>Fake PayPal Site (pay-pal-support.com) vs. Real PayPal (paypal.com)<br>o The fake site had an extra hyphen in the domain, which is a red flag.<br>o It lacked HTTPS encryption, making it less secure.<br>o The page asked for login details immediately, which is common in<br>phishing scams.<\/li>\n\n\n\n<li>Fake Banking Site (wellsfrgo-login.com) vs. Real Wells Fargo (wellsfargo.com)<br>o The fraudulent site had a slight misspelling in the domain name.<br>o It contained poor grammar and unusual fonts, unlike the professional look<br>of the real bank\u2019s website.<br>o The contact page had no working customer support links.<\/li>\n\n\n\n<li>Fake Retail Site (amazon-bigdeals.com) vs. Real Amazon (amazon.com)<br>o The fake store promoted massive discounts that seemed too good to be<br>true.<br>o The checkout page did not have secure payment options.<br>o The URL contained extra words and hyphens, making it look suspicious.<br>From this, I learned that carefully checking URLs, looking for HTTPS, and verifying<br>branding details are keyways to avoid fake websites.<br>Sources:<\/li>\n<\/ol>\n\n\n\n<ul>\n<li>IT Governance Blog: How to Spot a Fake Website<\/li>\n\n\n\n<li>Norton Cybersecurity: Identifying Scam Websites<\/li>\n\n\n\n<li>Federal Trade Commission (FTC): Online Shopping Scams<\/li>\n<\/ul>\n\n\n\n<p>Journal Entry #7<\/p>\n\n\n\n<p>Meme 1: \u201cToo Good to Be True\u201d<br>Image Idea: A person excitedly clicking on an email with the subject line:<br>&#8220;Congratulations! You\u2019ve Won a $500 Gift Card!&#8221;<br>Text:<br>&#8220;Wow! A free gift card? Let me just enter my info real quick!&#8221;<br>Reality: Hackers collecting my credentials like it\u2019s Black Friday.<br>Relation to Human-Centered Cybersecurity:<br>This meme represents how phishing scams prey on emotions like excitement and<br>urgency. I\u2019ve seen so many fake giveaway emails that try to trick people into giving up<br>their information. A human-centered approach to cybersecurity means educating users<br>on recognizing these scams before they fall victim to them.<br>Meme 2: \u201cMy Password Strategy\u201d<br>Image Idea: A person confidently setting their password as &#8220;Password123!&#8221; and then<br>looking confused when they get a security breach notification.<br>Text:<br>&#8220;Who would ever guess my super-secret password?&#8221;<br>Reality: Literally everyone, including hackers.<br>Relation to Human-Centered Cybersecurity:<br>I used to think having a simple password was no big deal\u2014until I learned how easy it is<br>for hackers to crack common passwords. This meme reminds me why strong, unique<br>passwords and multi-factor authentication (MFA) are so important. A good security<br>system should also help users create secure passwords without making it frustrating.<br>Meme 3: \u201cSticky Note Security\u201d<br>Image Idea: A sticky note on a computer screen that says &#8220;Work Password:<br>Company123&#8243; while an IT security professional looks horrified in the background.<br>Text:<br>Me: \u201cThis way, I won\u2019t forget my password!\u201d<br>Cybercriminals: \u201cThanks for making my job easy.\u201d<br>Relation to Human-Centered Cybersecurity:<br>I\u2019ve seen people do this\u2014writing passwords on sticky notes or saving them in plain text.<br>It makes me realize that security needs to be convenient for people to actually follow<br>best practices. Using password managers and encouraging secure habits can help<br>prevent these everyday security risks.<\/p>\n\n\n\n<p>Journal Entry #8<\/p>\n\n\n\n<p>Watching the video made me realize how much movies and TV distort cybersecurity. Many films depict hackers as typing a few lines of code and instantly breaching systems, making hacking seem fast and effortless, when cyberattacks require careful planning, social engineering, and technical expertise. The media also overhyped certain threats, like making every hacker part of a global crime syndicate, while downplaying real-world risks like phishing attacks or weak passwords. While these portrayals make cybersecurity exciting, they often mislead the public into thinking attacks are only a concern for governments or large corporations. A more realistic portrayal of cybersecurity could help people take personal security measures more seriously.<\/p>\n\n\n\n<p>Journal Entry #9<\/p>\n\n\n\n<p>Social Media and Cybersecurity Reflection<\/p>\n\n\n\n<p>After completing the Social Media Disorder Scale, I scored a 1, which indicates &#8220;normative usage.&#8221; This suggests that while I do use social media, it has not significantly interfered with my responsibilities, relationships, or emotional well-being over the past year. I feel that I can maintain a healthy balance between my online and offline life.<\/p>\n\n\n\n<p>When reviewing the items on the scale, I thought they were well constructed and addressed key aspects of problematic social media behavior. The questions covered common warning signs such as preoccupation, withdrawal symptoms, and the neglect of other activities, which are consistent with behaviors often seen in addiction-related patterns. I appreciated how the scale didn\u2019t just focus on time spent but also included the emotional and social consequences of excessive social media use.<\/p>\n\n\n\n<p>I believe that patterns of social media use vary globally due to several factors. Cultural differences play a major role, as some cultures may place more value on in-person interactions, while others are more digitally integrated. Access to technology also shapes usage patterns in countries with widespread internet and smartphone availability may see higher engagement levels. Additionally, socioeconomic conditions and mental health awareness influence how people use social media, whether as a tool for connection, escapism, or information. Lastly, social norms and expectations regarding online behavior differ widely across regions, which helps explain these variations.<\/p>\n\n\n\n<p>Journal Entry #10<\/p>\n\n\n\n<p>The article on social cybersecurity highlights how misinformation and cyber<br>threats are shaping modern conflicts and national security. It emphasizes<br>that adversaries exploit social media and online platforms to manipulate<br>public opinion and destabilize societies. One key takeaway for me was the<br>importance of digital literacy in countering disinformation. As a cybersecurity<br>student, I found it insightful how the article connects human behavior to<br>cybersecurity, reinforcing that technology alone isn\u2019t enough\u2014education and<br>awareness are equally critical. This article broadened my understanding of<br>cybersecurity beyond technical measures, underscoring the need for a multi-layered approach to defense.<\/p>\n\n\n\n<p>Journal Entry #11<\/p>\n\n\n\n<p>The video &#8220;What Does a Cybersecurity Analyst Do?&#8221; by Nicole Enesse<br>provides a detailed look into the responsibilities, required skills, and job<br>outlook for cybersecurity analysts. One key takeaway is how cybersecurity<br>analysts must understand both technology and human behavior to protect<br>organizations from threats. Social engineering attacks, such as phishing,<br>exploiting human psychology rather than technical vulnerabilities,<br>highlighting the need for security awareness training. Additionally, the role<br>requires strong communication skills, as analysts often collaborate across<br>departments to enforce security policies. This video reinforced my<br>understanding that cybersecurity is not just about technical defenses\u2014it\u2019s<br>also about educating and influencing people to adopt safer digital habits.<\/p>\n\n\n\n<p>Journal Entry #12<\/p>\n\n\n\n<p>Student Analysis: Economic and Social Science Perspectives on a Data Breach Notification<br>As a cybersecurity student analyzing the sample data breach notification from<br>Glasswasherparts.com, I found it insightful to connect this real-world event to both economic<br>and social science theories. This incident involved a security breach on a third-party platform<br>that exposed customer payment information. The company eventually notified users, outlining<br>the breach and offering guidance. Below, I explain how two economic theories and two social<br>science theories relate to this scenario.<br>Economic Theories<\/p>\n\n\n\n<ol>\n<li>Information Asymmetry<br>This theory describes a situation where one party holds more information than another in a<br>transaction. In the case of the breach, Glasswasherparts.com and its platform provider were<br>aware of the intrusion months before notifying customers. As someone who shops online<br>regularly, I find this delay concerning because it prevented customers from taking timely steps<br>to protect their financial information. The lack of immediate transparency left customers<br>vulnerable and created an imbalance in power and knowledge\u2014exactly what the concept of<br>information asymmetry highlights.<\/li>\n\n\n\n<li>Negative Externalities<br>A negative externality occurs when the costs of an action are imposed on others. Here,<br>customers bore the financial and emotional burden of the breach, even though they had no<br>role in the platform\u2019s poor cybersecurity measures. As someone studying cybersecurity, I see<br>how this underscores the importance of companies being held accountable for not just<br>protecting their own assets, but for preventing harm to others. It also shows how weak<br>cybersecurity can have widespread, unintended consequences.<br>Social Science Theories<\/li>\n\n\n\n<li>Social Contract Theory<br>This theory suggests that individuals give up certain freedoms and trust organizations to act in<br>their best interest, especially regarding privacy and protection. When customers share their<br>personal data with a business, they expect that business to act responsibly. From my<br>perspective, the breach represented a clear violation of this social contract. While the letter<br>tried to reassure customers and guide them on how to respond, the trust was already damaged<br>by the delay and the exposure of sensitive information.<\/li>\n\n\n\n<li>Labeling Theory<br>As a student also studying criminology, I found this theory particularly relevant. Labeling theory<br>focuses on how society\u2019s reaction can define individuals or organizations. Even if the breach<br>was technically the fault of a third-party provider, Glasswasherparts.com could be labeled as<br>negligent or untrustworthy. This label could stick with them for a long time, affecting their<br>brand and customer loyalty. It shows that beyond just technical recovery, businesses must also<br>manage public perception<\/li>\n<\/ol>\n\n\n\n<p>Journal Entry #13<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Journal Reflection \u2013 Bug Bounty Policies and Cybersecurity Strategy<br>As a cybersecurity student, reading &#8220;Hacking for Good: Leveraging HackerOne Data to Develop<br>an Economic Model of Bug Bounties&#8221; gave me a practical perspective on how policy and<br>economics work together to strengthen cyber defense. The article showed how bug bounty<br>programs are not just about hiring hackers\u2014they\u2019re about creating an ecosystem were ethical<br>hackers, or \u201cwhite hats,\u201d can contribute to security while being rewarded fairly.<br>Thoughts on the Literature Review<br>What really stood out to me in the literature review was how common it is for security<br>researchers to avoid reporting bugs due to fear of legal consequences. That surprised me. I had<br>always thought of bug bounty programs as inviting collaboration, but this made me realize the<br>importance of clearly written policies and formal agreements between companies and hackers.<br>It\u2019s not enough to say \u201cwe welcome feedback\u201d\u2014there needs to be a structure that protects<br>researchers.<br>The literature review also linked these programs to economic theories, especially the cost benefit principle. For companies, offering a bounty may be less expensive than dealing with the<br>aftermath of a breach. That cost-efficiency argument made total sense to me, especially coming<br>from a background where we\u2019re constantly taught to assess risk versus reward in security.<br>My Take on the Findings<br>The findings showed that money isn\u2019t the only motivator for ethical hackers\u2014many do it for<br>skill-building, job opportunities, or even fun. I can relate to that. As someone who\u2019s taken part<br>in small Capture the Flag (CTF) challenges, the reward is often just solving the puzzle. But for<br>companies, knowing that non-monetary factors play a role could help them better design their<br>bounty programs.<br>I also learned that older bug bounty programs tend to get fewer valid reports, which was an<br>interesting pattern. It made me think about how attackers and researchers alike always shift to<br>newer, more vulnerable targets. So, companies can\u2019t just launch a bug bounty once and expect<br>it too always work they need to evolve and adapt<\/p>\n\n\n\n<p>Journal Entry #14<\/p>\n\n\n\n<p>After reviewing Andriy Slynchuk\u2019s article on illegal things people often do online, I believe the five most serious violations are hacking into someone\u2019s account, identity theft, online scams, cyberbullying, and downloading or distributing pirated content. I think hacking and identity theft are extremely serious because they invade a person\u2019s private life and can ruin their financial security and mental well-being. Online scams are also a major threat because they take advantage of people\u2019s trust and can cause real emotional and financial damage. Cyberbullying stands out to me because it often leads to long-term psychological harm, and sometimes even tragic outcomes like suicide. Finally, downloading pirated content might seem harmless at first, but it damages industries like film, music, and software development, hurting creators who deserve to be paid for their work. Reading this article made me more aware of how important it is to respect others online and think about the real consequences behind common internet behavior.<\/p>\n\n\n\n<p>Journal Entry #15<\/p>\n\n\n\n<p>After watching Davin Teo\u2019s TEDx talk on digital forensics, I was surprised by how deeply his career intertwines with the social sciences. At first glance, digital forensics sounds purely technical data recovery, investigating cybercrime, and working with machines. But the way Davin explained his work made me realize that understanding human behavior is just as important as understanding technology.<\/p>\n\n\n\n<p>Davin didn\u2019t start off in digital forensics. His journey took twists and turns, including time in corporate environments and different cultural settings, before he found his calling in forensics. What stood out to me was how his experiences with people, not just computers, helped shape his perspective. His work often involves thinking like the person who committed the crime asking questions like: <em>Why would someone does this? What patterns of behavior led to this digital footprint?<\/em> That\u2019s where the social sciences come in.<\/p>\n\n\n\n<p>Fields like psychology, sociology, and criminology help digital forensics investigators understand motivation, deception, and even social engineering tactics. Davin emphasized that his job is not just about analyzing hard drives it\u2019s about putting together stories and behaviors, kind of like a digital detective. This is really connected to the idea that technological crimes are still very human at their core.<\/p>\n\n\n\n<p>His pathway made me reflect on how important it is to be open to different experiences and disciplines. Just because a career is technical doesn\u2019t mean it lacks a human side. In fact, the best investigators probably <em>need<\/em> that social science mindset to really be effective. I admire how Davin brought empathy, curiosity, and critical thinking into his career, and it makes me more excited about blending cybersecurity with social understanding in my own path.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Article Reviews <\/h2>\n\n\n\n<p>Article Review #1<\/p>\n\n\n<a href=\"https:\/\/student.wp.odu.edu\/cdard004\/wp-content\/uploads\/sites\/38375\/2025\/04\/Article-review-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Article-review-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Article Review #2<\/p>\n\n\n<a href=\"https:\/\/student.wp.odu.edu\/cdard004\/wp-content\/uploads\/sites\/38375\/2025\/04\/Article-review-2.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Article-review-2<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Career Papers<\/h2>\n\n\n<a href=\"https:\/\/student.wp.odu.edu\/cdard004\/wp-content\/uploads\/sites\/38375\/2025\/04\/Career-Paper.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Career-Paper<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal Entries Journal Entry #1 Workforce Framework for Cybersecurity (NICE Framework) | NICCS (cisa.gov)After reviewing the NICE Workforce Framework for Cybersecurity, I would be interestedin \u201cSecurely Provision\u201d category, particularly roles focused on Risk Management andSystems Architecture. These areas align closely&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/cdard004\/cyse-201s\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30482,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/cdard004\/wp-json\/wp\/v2\/pages\/13"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/cdard004\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/cdard004\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cdard004\/wp-json\/wp\/v2\/users\/30482"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cdard004\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":3,"href":"https:\/\/student.wp.odu.edu\/cdard004\/wp-json\/wp\/v2\/pages\/13\/revisions"}],"predecessor-version":[{"id":56,"href":"https:\/\/student.wp.odu.edu\/cdard004\/wp-json\/wp\/v2\/pages\/13\/revisions\/56"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/cdard004\/wp-json\/wp\/v2\/media?parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}