{"id":13,"date":"2024-09-23T02:56:21","date_gmt":"2024-09-23T02:56:21","guid":{"rendered":"https:\/\/student.wp.odu.edu\/dpope005\/?p=13"},"modified":"2024-12-12T22:34:24","modified_gmt":"2024-12-12T22:34:24","slug":"cyse201s","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/dpope005\/2024\/09\/23\/cyse201s\/","title":{"rendered":"CYSE201S"},"content":{"rendered":"\n<p>Journal Entry #1 <\/p>\n\n\n\n<p>Throughout the NICE Workforce Framework, there are a plethora of areas that I myself could focus my career on. These different areas of careers are called \u201cWork Role Categories\u201d. In specific there are 7 different Work Role Categories which are, Oversight and Governance (OG), Design and Development (DD), Implementation and Operation (IO) Protection and Defense (PD), Investigation (IN), Cyberspace Intelligence (CI), and Cyberspace Effects (CE). Within these different categories are all different types of work roles that one could partake in. If I were to appraise the skills that have, I would say that I am highly attentive\/observant to detail, and slightly nosy. So I would say that I would probably be great in working in something like Investigation, or Oversight and Governance. These would proably interest me the most because they would be the best candidates for the abilities that I best myself in. I probably wouldn\u2019t want to do something along the sorts of Design and Development, because I don\u2019t find myself to be the best with something like coding which is mainly used for something like that.<\/p>\n\n\n\n<p>Journal Entry #2<\/p>\n\n\n\n<p>The question that was presented to me has to do with two of the parts of the world that I am currently studying, and the most interested in. The question is, how do the principles of science relate to cyber security? Now when we are talking about the principles of science, we want to be specific on what those principles of science are. I would describe those principles of science to be the scientific method such as Hypothesis, Research, Data, Results, and so on. All of these different concepts apply to the field of cyber security. For example, ethical hackers conduct experiments on the thing they are trying to protect in order to grab data and fix what ever is causing problems. They will form a procedure, test that procedure, get the results from the experiments, and gather that data to spread it throughout the company they work with to make sure there systems are secure.<\/p>\n\n\n\n<p>Journal Entry #3<\/p>\n\n\n\n<p>Searching PrivacyRights.org, I found a lot of good information about data breaches. The first piece of information I found was a Q&amp;A giving a basic overview of what a data breach is. PrivacyRights.org says, \u201cA data breach is a security violation in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an unauthorized individual.\u201d PrivacyRights.org also provides a few United States data breach notification reports. As stated by PrivacyRights.org, \u201cThis comprehensive resource is an essential guide for privacy-conscious consumers, researchers, policymakers, and students alike.\u201d&nbsp; It provides an interactive dashboard that researchers and many more can use to gather information about data breaches.<\/p>\n\n\n\n<p>Journal Entry #4<\/p>\n\n\n\n<p><em>Maslow\u2019s Hierarchy of Needs&nbsp;<\/em>has five different levels in respective order, physiological needs, safety and security, love and belonging, self-esteem, and self actualization. Within all the time that I have been interacting with the digital world, it has built its repertoire in my hierarchy of needs. My phone would be on the lowest level of physiological needs as it is something that I use everyday in order to operate on a daily basis. A step up, safety needs would be something like antimalware software. Personally, I have McAfee antivirus software downloaded onto my computer. Love and belonging would be something like social media, I have instagram for example. Esteem needs would be something like achievements that I have, I have a bunch of photos on my phone in a folder highlighting all of the achievements that I have accomplished. And lastly, self actualization, something that allows you to grow. I could say something that applies to this would be school, as I tend to use canvas a lot on my phone and computer. Canvas allows me to apply myself to different assignments and help me work on continuing to improve myself.<\/p>\n\n\n\n<p>Journal Entry #5<\/p>\n\n\n\n<p>Based on reading all of the articles, it is my job for this weeks journal entry, to assign each of<br>them in order to what I think makes the least sense to what I think makes the most sense. The<br>things that I am rating are the all the different reason that someone would commit a crime. From<br>least sense to most sense in my opinion I would list the motives as, boredom, entertainment,<br>political, recognition, for money, revenge, multiple reasons. I believe that boredom and<br>entertainment are sort of in the same branch of understanding. I think that they sort of make<br>sense because some people believe that their lives aren\u2019t very entertaining and they need to<br>spice things up, but there are so many other ways to provide yourself with entertainment in this<br>world that committing a crime doesn\u2019t make that much sense as entertainment value. I think that<br>political crime is a little odd because in most cases they just allow you to get ahead of your<br>competitors. But committing a in your country, to serve your country doesn\u2019t really make sense<br>to me. I understand a little bit about recognition because being famous could mean a lot for a<br>person, but it is still also nonsensical because there\u2019s better ways in this world to become<br>recognized. Money is where things start to make more sense for me because money in this<br>world is not the easiest thing to get, and at times it seems like its the only thing in this world that<br>really matters. Committing crime for money is understandable, but in essence you are still<br>committing a crime. Revenge also makes a lot of sense because it is a natural reaction for a<br>human to be angry at something or someone they believed did them wrongfully. Lastly, I put<br>multiple reason because I feel like it is just a culmination of all of the others into one and having<br>multiple reasons to do something makes more sense than just doing something for one specific<br>reason.<\/p>\n\n\n\n<p>Journal Entry #6<\/p>\n\n\n\n<p>For someone that has been on the internet for a pretty long time in retrospect, spotting a fake website it pretty easy, but if you aren&#8217;t very in tune with the internet there are usually a few tell tale signs that the website you are on is actually a front and is a fake website. The first and most obvious would be the domain name. Only one website can have a specific domain name at a time, so a fake website would typically misspell a domain name to try and mask itself to be the real website. For example it would be something like amaz0n.com vs amazon.com. Another way you can spot a real website from a fake website is the security certificate that it attached to the real website. On a real website, there will be a padlock on the left side of the domain, indicating the the website has a valid SSL certificate assigned to the website. Fake sites will usually lack this or use an invalid certificate.<\/p>\n\n\n\n<p>Journal Entry #7<\/p>\n\n\n\n<p>The person in the photo here is smiling, but what\u2019s below the surface is that a few hours ago he<br>protected his agency from a huge data leak, and is taking lunch break talking about it with one<br>of his coworkers.<\/p>\n\n\n\n<p>The guy in this photo seems peaceful, but don\u2019t be mistaken. He is using the area to calm his<br>nerves while trying to fix a data leak within his companies systems.<\/p>\n\n\n\n<p>A company is having a team board meeting in order to discuss the faults within their system,<br>soon they will be back to work furthering patches to make sure that all of their systems are safe.<\/p>\n\n\n\n<p>Journal Entry #9<\/p>\n\n\n\n<p>For the scale I scored a 4 out of 9, which is just out of reach for diagnosis if DSM, but I do feel that at time social media use has taken a toll on my life. I think that the most important question that was asked and that applies to most people is the question about using social media as an escape. Social media is a very easy way to escape from reality and ignore responsibilities and duties in the real world. And since social media has that much power it could be possibly used in dangerous ways by people. I think that different patterns are foudn in the world because the types of media used around the world differs greatly and people use different platforms.<\/p>\n\n\n\n<p>Journal Entry #12<\/p>\n\n\n\n<p>I found this sample breach letter to refer to two different theories. One of the theories coming from economics being the Agency theory. To give an explanation, Agency Theory explores the relationship between principals and agents and the potential conflicts that can arise due to differing incentives. The way that the agency theory connects to sample breach letter is the customers expect their personal and financial information to be protected, but the breach highlights a failure by the platform provider (acting as an agent) to meet these expectations. The letter serves to inform customers (principals) of this breach in trust and attempts to reassure them by outlining steps taken to rectify the issue, thus attempting to align the company\u2019s actions with customer interests to restore credibility. The other theory that would relate to this would be the social science theory trust repair. Trust repair theory suggests that organizations can restore trust after a breach through transparency, apology, and corrective actions, such as this security breach letter.<\/p>\n\n\n\n<p>Journal Entry #15<\/p>\n\n\n\n<p>The work of digital forensics investigators is inherently connected to the social sciences, because it involves understanding the human elements behind digital evidence. Davin Teo is able to exemplify this because his career journey illustrates the value of embracing diverse experiences and the potential for interdisciplinary approaches to lead to success in the evolving field of digital forensics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal Entry #1 Throughout the NICE Workforce Framework, there are a plethora of areas that I myself could focus my career on. These different areas of careers are called \u201cWork Role Categories\u201d. In specific there are 7 different Work Role&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/dpope005\/2024\/09\/23\/cyse201s\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":29592,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/posts\/13"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/users\/29592"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":2,"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/posts\/13\/revisions"}],"predecessor-version":[{"id":32,"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/posts\/13\/revisions\/32"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/media?parent=13"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/categories?post=13"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/tags?post=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}