Journal Entry

NICE Workforce Framework.( #1)
  • by Elena Bedoya
  • January 14, 2024

My career goal is to become a corporate lawyer. I believe that the NICE workforce framework provided me with an idea of valuable skills to achieve my goal. On this list of skills, legal advice, advocacy, and language analysis stood out to me as relevant to my profession. These skills will allow me to help clients, provide advice, recommend ways to protect their company from legal action, and prevent legal issues. I will also be able to create and advocate for legal policies within the company. Additionally, I will need to have a good understanding of the language used in legal documents to ensure that the company is protected and that policies are created to prevent legal issues. Overall, I will be using these skills to create policies with the companies to avoid legal problems and protect themselves from legal action.

Principles of Science (#2)

Science principles are used to understand how to deal with cyber threats. It’s like how scientists study what is around us, we learn how things work on the internet, we try to find problems and try to figure out what went wrong. It is like when there is an action there is a reaction, the same thing goes for the internet. We have to solve the issue slowly, kinda like scientists working on an experiment to prevent or solve an issue. We need to think carefully to help find problems on internet devices. Things are changing fast, and we are still learning new ways to keep ourselves safe on the internet. By using scientific suggestions, we can help prevent cyber issues.

Breaches (#3)

This website is used to help people prevent or access help when a breach has happened. When researching information about breaches this website provides quick a lot of information. It gives details of past breaches which can help you evaluate cybersecurity risk. It also provides you with victim profiling which can you understand the victim’s background. You can also beach notifications and regulatory responses to data breaches which help with having an idea of the legality of data breaches. You can gain a lot of information for those who are studying breaches.

Motive Scale (#6)

1.Huaman-Centered cybersecurity: Humans are the reason why there are so many breaches in the system. This will look at human behavior and make them the center of prevention. Humans are the main reason why they get hacked.

2. Planned Behavior: This views human behavior in a positive or negative state of mind. If a human has a positive environment then they are unlikely to make an error. However, if they are in a negative environment then they will fall for scams because they want to move up or be appraised by the company. This is based on human behavior however it is just one angle of looking at it

    3. Technological Determinism: These are new technologies that help humans limit from thinking and acting. This will help to prevent humans from getting into scams. However, humans are the reason we get into security breaches in the company.

    4. Change Management :Management has an expectation and a policy. However, humans are incapable of questioning policy and do what they are told. This can cause people to phish.

    Meme(entry 7)

    This meme is to show that phishing people is so easy even a dog can do it. Therefore, this should be a wake-up call for people who are on the internet. People are out here looking for people so naive and will give up personal information without realizing the harm it will cause them. This should give you an idea to start getting into training and have resources to keep yourself protected from people on the internet trying to phish people.

    influences and Cybersecurity (#8)

    After watching this video, I realized that many movies deal with hacking into systems or personal devices. A good example that this video provided was Ocean 8. In this scene, a woman was speer phishes. She looks up someone on social media to find relatable interest. She then created a link with images of dogs that the gentleman owned. He then fell for the trap and clicked the link, giving the woman full access to his computer. Even though this isn’t exactly how it works, it still gives the idea that not everything on the internet is what it is intended to be. This also gives another reason why we shouldn’t be putting so much of our lives on the interested. Anything we put on our social media can be used against us to get access to our personal information. This video, even though most of the scenarios that are shown on this video are somewhat exaggerated, they still can be very real.

    Social Media Disorder Scale (#9)
    Tobi-Goldfus-Social-Media-Disorder-Scale

    How did you score? My score was 3 out of 9. Which means I do not have a social media disorder.
    What do you think about the items in the scale? I feel like the scale is a little too extreme when it comes to the questions. Maybe for me, it was, but maybe not for people who cannot live without social media. It is hard to see that some of these questions are someone’s reality.
    Why do you think that different patterns are found across the world? Social media doesn’t discriminate, and it is very user-friendly. Social media itself is its own culture, and anyone can be part of it. It attracts everyone’s interest, and it’s appealing to whoever joins these platforms. It creates a space to be pulled into people’s lives, interests, and creativity. It does not exclude anyone from using it which, is why so many people around the world use it. You get to access so many other people’s lives and see things that you have never experienced in your hometown. It’s a world of its own.

    The summary of Social Cybersecurity(#10)

    In the article “Social Cybersecurity,” the writer talks about how important it is to think about people’s behavior when it comes to keeping our online world safe. The author talks about how cybersecurity isn’t just about computers and programs; it’s also about how people use technology and social media. The article states that social media and the internet are a big part of our lives now. It examples how people can trick others online and spread false information, which can be a danger to our online safety. What is also mention in this article is that we need to work together to keep the internet safe. It’s not just up to experts but everyone needs to learn how to be safe online. This means knowing how to spot scams and scammers and being careful about what we share on social media. After reading the article, I realized that staying safe online isn’t just about having strong passwords. It’s also about being smart and thinking critically about what we see and share online. It’s important for everyone to learn how to use the internet safely, especially since we rely on it so much. This has taught us that online safety is not just about technology but it’s also about understanding people’s behavior. By learning to be cautious online, we can help other and ourselves safer online.

    Socal theme that Arised (#11)

    Cybersecurity analysis relates to a lot of social themes. In this position, you have to provide awareness and education about cyber threats. They have to respond to phishing attacks and intrusion attacks. As well as monitoring the network and trying to protect the network and also protect people’s privacy.

    The Theories of Econmoinc and Cybersecurity(#12)

    Economic theory: the company decided to use a third party to protect to run its website. The company invested in this platform to help them promote this service online and have the customer have easy access to the product.
    Classical economic theory: The company had a customer use the website to request a service or product. The customer would provide the website with debit or credit information with full names and addresses. The company that provided this platform had a cyber breach and was able to find out and notify the company to inform the consumers.

    A summary(#13)

    This article talks about how important it is to have knowledge about people’s behavior when it comes to keeping online safe. The author talks about cybersecurity and how it isn’t just about computers and programs, but also about how people use technology and social media. It also states that social media and the internet itself plays a big part of our lives our daily lives. It talks about how people can scam other people on online and spread fabricated information, which can destroy our safety on the internet. It as well mentioned that we need to work on keeping the internet a safe place. It’s not just up to professional but everyone needs to learn how to be safe on the internet. This includes knowing how to spot and catch scams and scammers. Also being too careful about what we share on social media. Staying safe online isn’t about creating strong passwords, but being smart on what we see and share on the internet. It’s important to learn how to use the internet safely, especially since when we rely on it every day. This has taught me about online safety when using technology and it made me understanding behavior people. I learned that I should be cautious when I am on the internet and that we can help other and ourselves to have a safer online.

    Top Five five most serious violations(#14)

    I put my top 5 most serios violation in order from serious to the lease serious.

    1. Bullying and Trolling: Cyberbullying is one of the worst ways to bully someone. It can cause so much danger to someone because everyone can see what is happening.
    2. Fake your Identity Online: This cause people to believe something they cannot verify and trick people. If its illegal to use false identity, then it should be the same online.
    3. Collecting information about children: Children information should not be collected because they can put the child at risk of anything.
    4. Illegal Search on the Internet: This can cause people to look and thing that shouldn’t. For example, people can pull up child porn or how to create a bomb. The internet should regulate and monitored.
    5. Using Unofficial streaming service: This is like steal money from a company. The company is losing money because people are not pay for their services.

    TED Talk Career (#15)

    It is interesting how the speaker did not have any background experience in digital forensics. He was in accounting at the start of his career and was randomly given the option to do IT work in his company. He had no interest in it, and then he began to develop an interest. This ultimately led him to get an opportunity to be part of a brand new team in Australia for a forensic digital science position. It is crazy how life gives you an opportunity to be great.

    Leave a Reply

    Your email address will not be published. Required fields are marked *