Category Archives: cyse201s

Journal 15

Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.

After watching Davin Teo’s TEDx talk on digital forensics, I was struck by how his career path blends technical expertise with a deep understanding of human behavior. He emphasized that digital forensics isn’t just about analyzing data; it’s about interpreting digital evidence within the context of human actions and intentions. This intersection highlights the importance of social sciences, particularly psychology and sociology, in understanding the motivations behind cybercrimes.

Teo’s journey into digital forensics wasn’t linear. He shared experiences that led him to appreciate the nuances of human behavior in digital spaces. His ability to connect technical findings with psychological insights demonstrates how crucial social sciences are in this field. It made me realize that effective digital forensics requires not only technical skills but also the ability to empathize and understand the human elements behind digital footprints.

Overall, Teo’s talk reinforced the idea that careers in cybersecurity and digital forensics are deeply interdisciplinary. The integration of social sciences provides a more comprehensive approach to investigations, ensuring that behind every piece of data, the human story is not lost.

Career Paper: Cybersecurity as a Social Science in Security Research and Reverse EngineeringCareer Paper:

Introduction 

Security researchers and reverse engineers do a lot more than write code or investigate malware. Their work depends just as much on understanding people as it does on understanding machines. Social science plays a huge role in their day-to-day, whether it’s figuring out how users interact with software, how attackers manipulate people, or how information spreads across networks. This career paper connects what we’ve learned in class, to the work that security researchers and reverse engineers do. It also looks at how their work affects society and marginalized communities, and the ethical decisions they must make. 

Human Behavior 

Security researchers regularly think about how people behave when using technology. Human-centered cybersecurity, covered in class, focuses on designing tools and systems that work with human behavior instead of against it. For example, a researcher might build a tool that alerts people to risky behavior, but if the alert is too confusing or annoying, users will just ignore it. So, researchers study usability and habits to make sure their tools actually help. 

Understanding social engineering is just as important. Adversaries often go after people or employees, not just systems, utilizing social engineering tactics like phishing, pretexting, and fake links. Researchers analyze these techniques to figure out what psychological tricks are being used. That way, they can train others and build defenses that make people less likely to fall for them. It’s not just about knowing the attack but about understanding why it works on humans. 

Risk Perception 

Risk perception is another major concept. Not everyone sees cybersecurity risks the same way. A company executive might not care about a “low” threat even if it’s technically serious. Meanwhile, a user might panic over something harmless. Security researchers have to explain risks in a way people understand. That means adjusting their language and approach based on who they’re talking to. 

Attacker Motives 

Knowing why attackers do what they do helps security teams fight back. Some are in it for money, others for politics or revenge. Social science helps researchers spot patterns and predict attacker behavior. Understanding how threats spread, like through social media or email, involves looking at social networks and online behavior, not just code. 

Impact on Society 

Security work affects everyone, but not everyone gets the same level of protection. Marginalized communities, like seniors and others that don’t have access to technology, often face greater risks and fewer resources. Research shows they’re more likely to be targeted and less likely to be protected. A good amount of cybersecurity research doesn’t include these groups, which is a problem. Security researchers who keep this in mind can make more inclusive tools and training. 

Ethics in Reverse Engineering 

Reverse engineering comes with big ethical responsibilities. Researchers have to make sure they’re not breaking laws or violating people’s privacy when analyzing malware or software. Even if the goal is good, they need to think about who might be harmed by their actions. That includes deciding when to share findings and how much detail to release. Often, it can be beneficial to hold off on releasing information on a vulnerability until a patch is already built for it. It’s a constant balance between helping the public and not giving attackers more tools. 

Conclusion 

Security researchers and reverse engineers work in a field that’s just as social as it is technical. From understanding human error and attacker behavior to designing better tools and thinking about ethics, their work connects closely with what we’ve studied in this course. Social science helps them make better decisions, communicate clearly, and create more secure systems that protect everyone—not just the most privileged users. As threats grow and tech evolves, it’ll be even more important for cybersecurity pros to think like both engineers and social scientists. 

Works Cited 

Haney, J. (2023, September 28). NIST Unveils Newly Named Human-Centered Cybersecurity Program | NIST. NIST. https://www.nist.gov/blogs/cybersecurity-insights/nist-unveils-newly-named-human-centered-cybersecurity-program  

Chattopadhyay, A., Carvajal, R., Chaganti, V., & Venkatagiri, S. (2024, August). Where are marginalized communities in cybersecurity research? Poster presented at the 2024 Symposium on Usable Privacy and Security (SOUPS), Philadelphia, PA. USENIX Association. https://www.usenix.org/system/files/soups2024_poster56_abstract-chattopadhyay_final.pdf 

‌ 

Pfleeger, S. L., & Caputo, D. D. (2012). Leveraging behavioral science to mitigate cyber security risk. Computers & Security, 31(4), 597–611. https://doi.org/10.1016/j.cose.2011.12.010 

Article Review #2: Testing human ability to detect ‘deepfake’ images of human faces 

The article “Testing human ability to detect ‘deepfake’ images of human faces” by Bray, Johnson, and Kleinberg explores how well people can tell the difference between real and deepfake faces. Using a study of 280 participants across different testing groups, the authors wanted to know: First, how accurately people can detect deepfakes, second, whether small interventions like giving advice or showing examples beforehand help, and third, whether people are confident in their decisions even when they’re wrong. 

The study used a randomized control trial and collected data from participants who viewed 20 face images: half real and half AI-generated and had to label each one. Some groups received brief advice or example images before starting. Participants also rated how confident they were with each choice. The results of the study showed that overall accuracy wasn’t much better than chance, and surprisingly, the extra help didn’t really improve performance. People were often very confident in their answers even when they were wrong, which shows a disconnect between perception and reality. 

I think this connects well with social science concepts discussed throughout the course. We learned about symbolic interactionism, where meaning is created through individual interaction. People think they “see” the truth in a photo, but that meaning can be manipulated, especially by deepfakes. Social cybersecurity also ties in. The article studies more than just technology, it analyzes how people process visual info, how confident they feel in those judgments, and how attackers might exploit that overconfidence. 

From a cybersecurity culture standpoint, this article also reveals a problem: many people still lack the media literacy needed in today’s digital world. That’s especially concerning for marginalized groups, who are often the targets of manipulated media like deepfakes used for scams, harassment, or misinformation. This makes the research even more important from a social angle. 

Overall, the study shows that deepfake detection isn’t just a technological issue, it’s also a human issue. There’s no quick fix, and efforts to build awareness, improve education, and shape smarter policies will be important in helping society deal with this kind of threat.  

Sergi D Bray, Shane D Johnson, Bennett Kleinberg, Testing human ability to detect ‘deepfake’ images of human faces, Journal of Cybersecurity, Volume 9, Issue 1, 2023, tyad011, https://doi.org/10.1093/cybsec/tyad011  

Journal 14

Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

After reviewing the article, the five most serious internet violations include streaming or downloading content from unofficial sources, sharing someone else’s personal information or photos without consent, cyberbullying or trolling, collecting data on children under 13, and making illegal searches online. These stand out because they can lead to real legal consequences and cause significant harm to others.

Pirating movies or shows might seem low-risk, but it is considered theft and can result in fines or legal action. Sharing personal information or images of others without permission can lead to serious privacy violations and even physical danger, especially if the person becomes a target. Cyberbullying, while often brushed off as just “online behavior,” can lead to charges and has been linked to emotional trauma and, in extreme cases, suicide. Collecting data on kids under 13 without following proper legal procedures violates federal COPPA law and puts vulnerable users at risk. Finally, certain online searches, especially those related to criminal content, can lead to investigations or even arrests depending on what is being accessed.

These actions highlight how important it is to understand that what is done online can have serious offline consequences. Many of these behaviors may seem minor or common, but they carry legal risks and can harm people in ways that are not always obvious.

Journal 13

A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure.  To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.  The policies relate to economics in that they are based on cost/benefits principles.  Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site.  and write a summary reaction to the use of the policies in your journal.  Focus primarily on the literature review and the discussion of the findings.

The article about bug bounty programs using HackerOne data shows how these programs help companies find security issues by paying freelance hackers. Even though they get paid, most hackers do it for other reasons like gaining experience or building a reputation. The study shows that even small or less popular companies can benefit from bug bounties, which makes them a good option for businesses without large budgets. The article points out that older programs get fewer bug reports unless they add more things for hackers to test, so while bug bounties are helpful and cheaper than hiring full-time staff, they’re not a perfect solution and don’t catch everything. There’s still a lot that’s not fully understood about how these programs work, but they’re a good tool to have as part of a company’s security plan.

Journal 12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

The Glasswasherparts.com data breach notice shows some key ideas from the module, especially Rational Choice Theory and Cost-Benefit Analysis. The company and their third-party provider probably made choices based on saving money in the short term. They didn’t invest in better security or tell customers right away, which makes sense under Rational Choice, they were trying to avoid immediate losses, even if it could cause bigger problems later. After the breach, they had to remove malware, work with law enforcement, and tell customers, which likely cost a lot more than preventing it in the first place.

Social science theories like Risk Assessment and Information Flow also connect to this. People, not just technology, made decisions about how risky the situation was and when to tell people. The delay shows that they thought it was fine to wait. The way the information was shared (or not shared) matters too. Because customers didn’t get told in time, they kept using the site without knowing their info was at risk. That kind of delay can hurt trust and have financial consequences. In the end, the breach shows that cybersecurity problems often come from human choices and priorities, not just technical issues.

Journal 11

As you watch the video https://www.youtube.com/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.

A cybersecurity analyst encompasses a few social themes that are required to conduct the job effectively. Communication skills are a must. They must be able to convey security topics to a range of different people, from experts to non-technical workers or clients. Collaboration is also vital in this job role. It’s sometimes necessary to work across different departments, and collaboration is key in these instances. Related to the previous two, is the ability to train and spread awareness to employees about best security practices and how employees may be vulnerable to social engineering attacks.

Journal 10

Read this and write a entry summarizing your response to the article on social cybersecurity

 https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site.

The article discusses the ever evolving field of social cybersecurity and its growing significance in national security and warfare. Social cybersecurity aims to understand and predict how information online influences human behavior and its outcomes in society. The article highlights how adversaries (particularly in Russia) are specifically targeting information sources that affect public opinion and destabilize societies without the need for military action.

The article proposes a few solutions to counter the problem. It calls for the development of policies that allow institutions to combat these threats without affecting the privacy of individuals. This could be through education, specifically, about the nature of information in today’s landscape and the risks of being targeted with misinformation.

Journal Entry 9

Complete the Social Media Disorder scale. How did you score?  What do you think about the items in the scale? Why do you think that different patterns are found across the world?

I scored 2/9 but I actively try to keep social media to a minimum in my life. That’s not to say I don’t get caught scrolling through Instagram reels regularly, but I do try to keep some discipline in that department.

As humans, we strive for social acceptance and dread being rejected socially. I think that’s what social media ultimately taps into, and exploits in all of us. It is the ultimate way to keep in contact with our friends and family, but also has a dark side. They say that if something is free, you are the product. Social media companies engineer their algorithms to keep you in their apps and on their websites as long as possible, because they can push you more advertisements, and thus make them more money.

I do think it is important for the DSM to acknowledge that there is a problem here with social media addiction and “Social Media Disorder.” Social media is still relatively new, but it is apparent that there is an addictive nature to it, and should be clinically diagnosed as a “disorder.”

Journal Entry 8

After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity

I think the media can often shape how people perceive the world of cybersecurity, and they tend to overexaggerate it. To keep engagement, they frequently depict it as fast-paced and flashy, speaking fake catch-phrases and terminology to make it sound “high-tech.” While this is entertaining, it creates unrealistic expectations about how cybersecurity actually functions on a day to day basis. There are a few examples in this video that do a pretty good job at sticking to some sort of reality. Mr. Robot, as she notes, does a good job depicting capture-the-flags, the environment, and the actual ideas and technology behind them. But, then again, Mr. Robot is a show specifically about cybersecurity and hacking. If it was not accurate to a certain degree, it would suffer critically, and not be nearly as good as it is.