Journal Entry #1
Throughout the NICE Workforce Framework, there are a plethora of areas that I myself could focus my career on. These different areas of careers are called “Work Role Categories”. In specific there are 7 different Work Role Categories which are, Oversight and Governance (OG), Design and Development (DD), Implementation and Operation (IO) Protection and Defense (PD), Investigation (IN), Cyberspace Intelligence (CI), and Cyberspace Effects (CE). Within these different categories are all different types of work roles that one could partake in. If I were to appraise the skills that have, I would say that I am highly attentive/observant to detail, and slightly nosy. So I would say that I would probably be great in working in something like Investigation, or Oversight and Governance. These would proably interest me the most because they would be the best candidates for the abilities that I best myself in. I probably wouldn’t want to do something along the sorts of Design and Development, because I don’t find myself to be the best with something like coding which is mainly used for something like that.
Journal Entry #2
The question that was presented to me has to do with two of the parts of the world that I am currently studying, and the most interested in. The question is, how do the principles of science relate to cyber security? Now when we are talking about the principles of science, we want to be specific on what those principles of science are. I would describe those principles of science to be the scientific method such as Hypothesis, Research, Data, Results, and so on. All of these different concepts apply to the field of cyber security. For example, ethical hackers conduct experiments on the thing they are trying to protect in order to grab data and fix what ever is causing problems. They will form a procedure, test that procedure, get the results from the experiments, and gather that data to spread it throughout the company they work with to make sure there systems are secure.
Journal Entry #3
Searching PrivacyRights.org, I found a lot of good information about data breaches. The first piece of information I found was a Q&A giving a basic overview of what a data breach is. PrivacyRights.org says, “A data breach is a security violation in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an unauthorized individual.” PrivacyRights.org also provides a few United States data breach notification reports. As stated by PrivacyRights.org, “This comprehensive resource is an essential guide for privacy-conscious consumers, researchers, policymakers, and students alike.” It provides an interactive dashboard that researchers and many more can use to gather information about data breaches.
Journal Entry #4
Maslow’s Hierarchy of Needs has five different levels in respective order, physiological needs, safety and security, love and belonging, self-esteem, and self actualization. Within all the time that I have been interacting with the digital world, it has built its repertoire in my hierarchy of needs. My phone would be on the lowest level of physiological needs as it is something that I use everyday in order to operate on a daily basis. A step up, safety needs would be something like antimalware software. Personally, I have McAfee antivirus software downloaded onto my computer. Love and belonging would be something like social media, I have instagram for example. Esteem needs would be something like achievements that I have, I have a bunch of photos on my phone in a folder highlighting all of the achievements that I have accomplished. And lastly, self actualization, something that allows you to grow. I could say something that applies to this would be school, as I tend to use canvas a lot on my phone and computer. Canvas allows me to apply myself to different assignments and help me work on continuing to improve myself.
Journal Entry #5
Based on reading all of the articles, it is my job for this weeks journal entry, to assign each of
them in order to what I think makes the least sense to what I think makes the most sense. The
things that I am rating are the all the different reason that someone would commit a crime. From
least sense to most sense in my opinion I would list the motives as, boredom, entertainment,
political, recognition, for money, revenge, multiple reasons. I believe that boredom and
entertainment are sort of in the same branch of understanding. I think that they sort of make
sense because some people believe that their lives aren’t very entertaining and they need to
spice things up, but there are so many other ways to provide yourself with entertainment in this
world that committing a crime doesn’t make that much sense as entertainment value. I think that
political crime is a little odd because in most cases they just allow you to get ahead of your
competitors. But committing a in your country, to serve your country doesn’t really make sense
to me. I understand a little bit about recognition because being famous could mean a lot for a
person, but it is still also nonsensical because there’s better ways in this world to become
recognized. Money is where things start to make more sense for me because money in this
world is not the easiest thing to get, and at times it seems like its the only thing in this world that
really matters. Committing crime for money is understandable, but in essence you are still
committing a crime. Revenge also makes a lot of sense because it is a natural reaction for a
human to be angry at something or someone they believed did them wrongfully. Lastly, I put
multiple reason because I feel like it is just a culmination of all of the others into one and having
multiple reasons to do something makes more sense than just doing something for one specific
reason.
Journal Entry #6
For someone that has been on the internet for a pretty long time in retrospect, spotting a fake website it pretty easy, but if you aren’t very in tune with the internet there are usually a few tell tale signs that the website you are on is actually a front and is a fake website. The first and most obvious would be the domain name. Only one website can have a specific domain name at a time, so a fake website would typically misspell a domain name to try and mask itself to be the real website. For example it would be something like amaz0n.com vs amazon.com. Another way you can spot a real website from a fake website is the security certificate that it attached to the real website. On a real website, there will be a padlock on the left side of the domain, indicating the the website has a valid SSL certificate assigned to the website. Fake sites will usually lack this or use an invalid certificate.
Journal Entry #7
The person in the photo here is smiling, but what’s below the surface is that a few hours ago he
protected his agency from a huge data leak, and is taking lunch break talking about it with one
of his coworkers.
The guy in this photo seems peaceful, but don’t be mistaken. He is using the area to calm his
nerves while trying to fix a data leak within his companies systems.
A company is having a team board meeting in order to discuss the faults within their system,
soon they will be back to work furthering patches to make sure that all of their systems are safe.
Journal Entry #9
For the scale I scored a 4 out of 9, which is just out of reach for diagnosis if DSM, but I do feel that at time social media use has taken a toll on my life. I think that the most important question that was asked and that applies to most people is the question about using social media as an escape. Social media is a very easy way to escape from reality and ignore responsibilities and duties in the real world. And since social media has that much power it could be possibly used in dangerous ways by people. I think that different patterns are foudn in the world because the types of media used around the world differs greatly and people use different platforms.
Journal Entry #12
I found this sample breach letter to refer to two different theories. One of the theories coming from economics being the Agency theory. To give an explanation, Agency Theory explores the relationship between principals and agents and the potential conflicts that can arise due to differing incentives. The way that the agency theory connects to sample breach letter is the customers expect their personal and financial information to be protected, but the breach highlights a failure by the platform provider (acting as an agent) to meet these expectations. The letter serves to inform customers (principals) of this breach in trust and attempts to reassure them by outlining steps taken to rectify the issue, thus attempting to align the company’s actions with customer interests to restore credibility. The other theory that would relate to this would be the social science theory trust repair. Trust repair theory suggests that organizations can restore trust after a breach through transparency, apology, and corrective actions, such as this security breach letter.
Journal Entry #15
The work of digital forensics investigators is inherently connected to the social sciences, because it involves understanding the human elements behind digital evidence. Davin Teo is able to exemplify this because his career journey illustrates the value of embracing diverse experiences and the potential for interdisciplinary approaches to lead to success in the evolving field of digital forensics.
Leave a Reply