Category Archives: Journal Entries

Journal Entry #5

Review the articles linked with each individual motive in the presentation page or Slide #4.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it.

  1. Political
    I list this one as number one. Now more than ever, people are motivated politically. Global politics are so divisive, and it makes a breeding ground for ‘hacktivists’ to make their point.
  2. For Money
    Money rules everything. There are a lot of cases of ransomware infecting hospitals, high-profile corporations and businesses. All of them ask for an absurd amount of money in order to unlock them. Advanced persistent threats also can operate as a black-market business in this way. If it’s profitable, these malicious organizations will take advantage of it.
  3. Revenge
    Employees of any business are the most vulnerable asset to a company. At times, disgruntled employees will arise and have then intent to cause harm, or to “get back” at a business or company for wrongdoing.
  4. Recognition
    Everybody wants their fifteen minutes of fame. This one could also go hand-in-hand with hacktivism, or to prove a point, or to prove skillfulness in hacking. This is where the term “owning” comes from in the hacking community.
  5. Entertainment
    Some people just find enjoyment out of tinkering with their own property and computers, or others. Like the “9to5mac” article points out, this hacker “Tom Liner” scraped 700 million LinkedIn user’s data, just for fun (and profit).

    http://9to5mac.com/2021/07/19/man-behind-linkedin-scraping/
  6. Boredom
    I think this one also ties in to entertainment. Although I don’t see how the article that is posted in the slides tie into how boredom influences those particular crimes.
  7. Multiple Reasons
    Some people may have their specific reasons not listed. While it is a valid reason, I don’t think this one should be raised above the others, since it would fluctuate on a case-by-case basis.

Journal Entry 4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

Our lives are becoming increasingly digital. As such, Maslow’s Hierarchy of Needs can apply to multiple areas in our digital lives. When we consider basic survival needs like food, water and shelter, there are services available that can deliver groceries (food and water) directly to your doorstep. You can sign a lease for an apartment without needing to even see the place, or close on a house and sign mortgage papers instantly.

Safety needs, defined by Maslow’s, can be fulfilled digitally through securing your online identity, assets and information. Antivirus software protects you from harmful malware and viruses. VPN’s encrypt your traffic, and keep it hidden from a potential attacker. Password managers make it easy and convenient to store passwords, and allow you to generate complex random passwords.

All in all, Maslow’s Hierarchy of Needs is definitely still relevant as it pertains to our digital lives.

Journal #3

Image source: https://www.griffinhouseconsultancy.co.uk/blog/when-do-i-need-to-report-a-data-breach/

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?

PrivacyRights.org provides information about just that. Their goal is to help inform people of their rights and choice they may be able to make to protect themselves. They offer information about various data breaches that extends into the tens of thousands of incidents. These records provide detailed information about each incident that breaches privacy rights. This can be an invaluable resource for researchers attempting to conduct archival research and find more information about specific events, how they were handled, who it impacted, and the effects that came from an incident. From this information, they could utilize it to perform trend analysis, assess the impact of an incident, and use it to inform new policy. 

Journal #2

image source: https://www.apu.edu.my/our-courses/postgraduate-studies/masters-degree-programmes/master-science-cyber-security

Explain how the principles of science [Empiricism, Determinism, Parsimony, Objectivity etc.,] relate to cybersecurity?

As a social science, the principles of science (such as empiricism, skepticism, parsimony, determinism, etc.) still apply when it comes to cybersecurity. Some aspects can be more difficult to conclude at times, as opposed to natural science counterparts, since there can be more gray areas in social science disciplines. However, when we consider the principle of skepticism, for example, we can consider and question aspects of a cybersecurity incident or an implementation of a system: How reliable is the data? Could it be a false positive/negative? Could the data be manipulated?

Another example could be the principle of parsimony. As cybersecurity professionals, it works in our favor to simplify our systems, documentation, and our communication to non-tech personnel. Simplification makes sure that everyone can understand a system, or the results of a report.

Considering the principles of science, and applying them to cybersecurity as a social science helps build strong, understandable systems in an ever-evolving cybersecurity landscape.

Journal #1

image source: https://0xinfection.github.io/reversing/pages/part-27-x64-assembly-part-1.html

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

I’d like to focus my cybersecurity career within the “Design and Development” work role category. Many of the roles I find interesting, but specifically I find the “Technology Research and Development” role interesting. This role is responsible for the development, engineering and research of software and systems security. Ultimately, a career as a security researcher or reverse engineer is my goal. I excel in situations where problem-solving is necessary, and hunting for threats and vulnerabilities in systems requires finding problems in order to solve them before they become dangerous. I think it’s necessary to understand how a system or software can be attacked or compromised in order to defend it.