{"id":19,"date":"2025-01-26T22:23:23","date_gmt":"2025-01-26T22:23:23","guid":{"rendered":"https:\/\/student.wp.odu.edu\/sthom124\/?page_id=19"},"modified":"2025-04-27T17:36:53","modified_gmt":"2025-04-27T17:36:53","slug":"journal-entries","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/sthom124\/cyse-201s\/journal-entries\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Journal Entry #1<\/summary>\n<p>Areas that appeal the most to me that I would want to focus my career on would be Systems Security Management. This entails the responsibility of managing the cybersecurity of a program, organization, system, or enclave. They also look into the risk assessments and analysis, threat assessments, and information classification.&nbsp;<\/p>\n\n\n\n<p>An area that does not appeal to me is Cybersecurity policy and planning. This entails developing and maintaining plans, strategy, and policy to align with cybersecurity initiatives and regulatory compliance. For me, I would prefer not to have to develop the plans and strategies, ensuring the safety of certain programs and running analysis on them seems more interesting.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Journal Entry #2<\/summary>\n<p>The principles of science-<\/p>\n\n\n\n<p>-Empiricism is the idea that learning comes from observations and experience. Scientists study things that relate to the senses.<\/p>\n\n\n\n<p>-Determinism means behavior is caused by preceding events.&nbsp;<\/p>\n\n\n\n<p>-Parsimony is keeping scientific explanations as simple as possible.&nbsp;<\/p>\n\n\n\n<p>-Objectivity is when scientists need things to be neutral and not opinion based during research.&nbsp;<\/p>\n\n\n\n<p>-Relativism is the concept that all things are related.<\/p>\n\n\n\n<p>-Ethical neutrality is the state of being neither morally right or wrong.<\/p>\n\n\n\n<p>The principles of science relate to cybersecurity by helping provide understanding for addressing and preventing cyber threats and attacks. Empiricism helps to focus on evidence and avoid assumptions when relying on data from security logs. Determinism focuses on cause and effect and predicting and preventing by implementing preventative measures. Parsimony drives to avoid complexity and keep things simple and efficient while objectivity requires bias-free analysis and transparency. Following the principles keeps things more organized and lead to effective security measures that protect the sensitivity of information and data systems.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Journal Entry #3<\/summary>\n<p>Public available information about data breaches include data collection in the privacy rights, clearing house, or breach level index. Most common is the privacy rights to access everything the software uses and collects data on. This is how they compile a comprehensive data set. Researchers also use data cleaning and preprocessing by removing duplicates and correcting errors. After this step, the data is analyzed and researchers identify patterns and may use certain techniques such as clustering to group similar breaches and determine the factors that contribute to the breach. Afterwards, the researchers develop models to predict future breaches and run risk assessments. Any risks or breaches are then reported and are continuously monitored.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Journal Entry #4<\/summary>\n<p>Maslow\u2019s hierarchy of needs is a psychological theory that categorizes human needs into 5 different levels. The first level consists of psychological needs. This is the basic need for survival which consists of food, water, shelter, etc. An example would be using my cell phone to order some food and drinks on the McDonald&#8217;s app. Secondly is safety needs which includes personal safety, financial security, and a safe environment. An example would be having cameras mounted outside and inside my house that is 24\/7 recording and I can view recorded or live footage on my phone. Third is love and belonging needs. This is relationships and a sense of belonging in social interactions. This can be achieved through social media and being a part of certain groups. Fourth is Esteem needs. That is the desire for respect and recognition from others. An example is being a youtuber who helps influence people to try new and healthy foods by listing the benefits. Fifth is self actualization needs. This is personal growth and reaching full potential. For instance, I can use my youtube platform to practice cooking and receive helpful feedback to improve.&nbsp;<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Journal Entry #5<\/summary>\n<p>The individual motives include, entertainment, political, revenge, boredom, recognition, money, or multiple reasons. According to the article links and why these specific motives take place, I would rank the motives in the following order:<\/p>\n\n\n\n<ol>\n<li>Multiple reasons<\/li>\n\n\n\n<li>Money<\/li>\n\n\n\n<li>Revenge<\/li>\n\n\n\n<li>Recognition<\/li>\n\n\n\n<li>Boredom<\/li>\n\n\n\n<li>Entertainment<\/li>\n\n\n\n<li>political<\/li>\n<\/ol>\n\n\n\n<p>I ranked this order because people commit cyber crimes for multiple reasons more than just one. Money, revenge, recognition combined can be their multiple reasons. Money and revenge come next due to scammers investing in properties or personal care\/benefit. Recognition, boredom, and entertainment follow up because like the articles state, there are a lot of teenagers jumping into cybercrimes due to anger or revenge. Political comes last because cybercriminals are more focused on the other motives.<\/p>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Details<\/summary>\n<p><\/p>\n<\/details>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Journal Entry #6<\/summary>\n<p>Fake website #1:&nbsp;<a href=\"http:\/\/blinkee.com\/\">Blinkee.com<\/a><\/p>\n\n\n\n<p>This website is full of color and images in hopes of attracting kids and parents with their low prices on their light-up toys. There is no credible company behind it and the phone numbers provided on the website leads to scammers to collect personal information for your purchase.<\/p>\n\n\n\n<p>Fake website #2:&nbsp;<a href=\"https:\/\/zapatopi.net\/treeoctopus\/\">Save The Pacific Northwest Tree Octopus (zapatopi.net)<\/a><\/p>\n\n\n\n<p>This website looks credible due to the updates and images on it, however this has some poor quality on it and seems like photoshopped or cropped images from other websites and it is used to spread false information.<\/p>\n\n\n\n<p>Fake website #3:&nbsp;&nbsp;<a href=\"https:\/\/discountelectronics.com\/?tw_source=google&amp;tw_adid=717180790073&amp;tw_campaign=21801579039&amp;gad_source=1&amp;gbraid=0AAAAADomNb6ESS3xMxEDnEeoRjZJyvzzX&amp;gclid=Cj0KCQiAq-u9BhCjARIsANLj-s2uYSID3B1zJVvqR9OXc5HA4nLbossQLT_1mSHh_4luChWS_yi9gy4aAg9LEALw_wcB\">DiscountElectronics.com.co<\/a><\/p>\n\n\n\n<p>This website offers electronics at a discounted price that does not seem like a legit price point, this is to obtain credit card information. The images for each product being sold is extremely pixelated and looks outdated. Such as an IPad being sold, however it is not a new IPad, it is an outdated one from many years ago.<\/p>\n\n\n\n<p>Real website #1:&nbsp;<a href=\"http:\/\/amazon.com\/\">Amazon.com<\/a><\/p>\n\n\n\n<p>This website has HTTPS:\/\/ in the beginning which is only one of many factors to go through before determining if it is real. This ensures a secure connection. Looking at legit reviews and pricing as well as quality of the website and images and there are several contact numbers for customer service and the website is widely known.<\/p>\n\n\n\n<p>Real website #2:&nbsp;<a href=\"https:\/\/www.ebay.com\/\">Ebay.com<\/a><\/p>\n\n\n\n<p>This website also has a secure connection. There are no extra characters in the link and everything is spelled correctly. You can type this directly into your browser instead of clicking links through emails or messages.&nbsp;<\/p>\n\n\n\n<p>Real website #3:&nbsp;<a href=\"https:\/\/www.rockauto.com\/\">rockauto.com<\/a><\/p>\n\n\n\n<p>This is a reputable website that is also secure and offers legit images and prices that are owned by the company and not copyrighted. It is also reputable for its customer service.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Journal entry #7<\/summary>\n<p>Meme: This relates to the images above because of the frustration people feel when their<br>information is being hacked and taken from them. Many operations work hard to provide<br>security and protect their information and yet people try to commit cyber attacks which leads to<br>more frustration. These photos above and the meme represent the feeling of relief when the<br>cyberattacker fails to complete their task at swiping information.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/student.wp.odu.edu\/sthom124\/wp-content\/uploads\/sites\/38112\/2025\/04\/Screenshot-2025-04-27-at-1.36.33\u202fPM.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"652\" src=\"https:\/\/student.wp.odu.edu\/sthom124\/wp-content\/uploads\/sites\/38112\/2025\/04\/Screenshot-2025-04-27-at-1.36.33\u202fPM-1024x652.png\" alt=\"\" class=\"wp-image-88\" srcset=\"https:\/\/student.wp.odu.edu\/sthom124\/wp-content\/uploads\/sites\/38112\/2025\/04\/Screenshot-2025-04-27-at-1.36.33\u202fPM-1024x652.png 1024w, https:\/\/student.wp.odu.edu\/sthom124\/wp-content\/uploads\/sites\/38112\/2025\/04\/Screenshot-2025-04-27-at-1.36.33\u202fPM-300x191.png 300w, https:\/\/student.wp.odu.edu\/sthom124\/wp-content\/uploads\/sites\/38112\/2025\/04\/Screenshot-2025-04-27-at-1.36.33\u202fPM-768x489.png 768w, https:\/\/student.wp.odu.edu\/sthom124\/wp-content\/uploads\/sites\/38112\/2025\/04\/Screenshot-2025-04-27-at-1.36.33\u202fPM-471x300.png 471w, https:\/\/student.wp.odu.edu\/sthom124\/wp-content\/uploads\/sites\/38112\/2025\/04\/Screenshot-2025-04-27-at-1.36.33\u202fPM.png 1240w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Journal Entry #8<\/summary>\n<p>The media influences our understanding of cybersecurity by providing real life examples of how hackers gain access to your information and form their cyber attacks. The most common form of hacking is phishing, and to access important documents that are not made public. News articles, tv shows, and online reports show real life data attacks and their consequences for both the victim and hacker. The media also provides examples and educates on how to prevent the cyberattacks and blocking them out by using strong passwords, two step authentication, using secure networks, and recognizing phishing attempts. On the other hand, certain tv shows may create an exaggerated idea of hacking but creating fake scenarios, so some people may not recognize the signs when real hacking happens.&nbsp;<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Journal entry #9<\/summary>\n<p>Based on my score of the social media disorder scale, I had 4 yes&#8217;s, which indicates risky usage on social media. I think this seems accurate, especially since social media is used to escape reality and negative emotions such as sadness or anger when it should be coped with in other ways. I think everyone will score different based on the area they are in. Certain states social media is popular in and how they make a living by being social media influencers. Some parts of the world do not have easy access to cell phones or social media, and other places have cell phones but are more about communicating face to face rather than over social platforms. <\/p>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Details<\/summary>\n<p><\/p>\n<\/details>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Journal entry #10<\/summary>\n<p>Social Cybersecurity- An Emerging National Security Requirement is a scientific study that aims to understand cyber-mediated changes in human behavior and the effects it has on society. It hilights key points in technology advances on how cyberattacks are committed and can be prevented. The article also emphasizes how information warfare has become disrupt and can divide societies easily. It discusses cognitive hacking and also grasps the importance of military leaders focusing on cyberattacks in the armed forces, the nation, and its values. I think given how the military has a lot of confidential information, keeping an eye out for cyberattacks is taken more seriously than traditional cyberattacks we see daily on social media.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Journal entry #11<\/summary>\n<p>The video explains how a cybersecurity analyst is a good beginners job that requires little experience, it describes salary and the locations as well as cost of living, such as D.C, New York, Atlanta, etc. It also discusses how to become a cybersecurity analyst including the certifications and insight on how to get the experience needed if you do not wish to go to college, and how to get your resume on point for this career such as reframing your accomplishments. The job outlook described gives good outlook for pay, getting into the career, and benefits of choosing this career.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Journal entry #12<\/summary>\n<p>The first theory of economic theories is The Theory of Externalities describes the actions of one party having an impact on a third party, not directly involved in the transaction, either positively or negatively, and in this case individuals data was compromised due to breach consequences. From a policy perspective, this theory supports the argument for stricter regulations and penalties for companies that fail to protect consumer data.&nbsp;<\/p>\n\n\n\n<p>The second theory is Information Asymmetry which describes where one party has better information than the other. Before the breach notification there is significant information asymmetry between the company and consumers, where the company knows about the breach and the consumers do not. The notification letter acts to correct this asymmetry and this theory highlights the importance of transparency and time sensitive information sharing.&nbsp;<\/p>\n\n\n\n<p>Social science theories behind this notification letter include the Social Contract Theory which can be seen as a violation of contract between the company and consumers. The consumers expect their data to be kept confidential and the notification highlights a failure in this social contract.&nbsp;<\/p>\n\n\n\n<p>The other theory is the Labeling Theory which examines the impact of labeling, stigma, and societal reactions on individuals. When applied to the notification, the company and affected individuals may experience labeling. The company may be labeled \u201cinsecure\u201d or \u201cirresponsible\u201d which potentially leads to a lost of trust and service with consumers.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Journal entry #13<\/summary>\n<p>The article Hacking for good: Leveraging HackerOne data to develop an economic model<br>of Bug Bounties is based on examining and enhancing organizational cybersecurity through the<br>bug bounty programs. They help identify and report software vulnerabilities that impact overall<br>security.The article uses data from HackerOne in August 2014-January 2020. During this time<br>period the program received over 50,000 valid reports. Using research data and different methods<br>and websites and datasets, bug bounty was able to remove several sources of endogeneity<br>plaguing in the cybersecurity field. They help to provide evidence whether certain programs<br>contribute positively to organizations&#8217; cybersecurity posture<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Journal entry #14<\/summary>\n<p>The five most serious offenses in my opinion is sharing passwords, addresses, and photos of others. Posting someone&#8217;s address online for others to see can put them in a dangerous position as they are more open to threats. Bullying and trolling can be life threatening as the effects of cyberbullying can lead to suicide or possible criminal charges. Faking your identity online can be classified as identity theft from using someone else&#8217;s information without their knowledge. Collecting information on people younger than 13 is against the children&#8217;s online protection act without consent from parents. It can put young individuals at risk. Lastly, illegal searches on the internet. There are rules about internet searching put into place to help protect privacy and personal safety. An example is searching how to make a bomb, or hiring a criminal.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Journal entry #15<\/summary>\n<p>Digital forensics is a career I wanted to get into after I get my degree. This video was very informative for digital forensic investigator. Davin Teo described what is done In forensics such as taking photos of scenes and after collecting data having to replace everything as it was. He also explained he got into it 17 years ago by accounting and having to do some side work for it. A case study he did was to stop the internet in a tech company and after digging into it there was a letter the company got about an IP address that got leaked and needed to shut down the internet for a fee. There was another one with a fraud investigation on their account, there were able to pull this and see millions of dollars in fraud charges. After this video, it shows they not only are like IT workers, but work with terabytes and hundreds of gigabytes that can take up to 5 hours just to make a copy of, much less dig into it. <\/p>\n<\/details>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":29355,"featured_media":0,"parent":15,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/sthom124\/wp-json\/wp\/v2\/pages\/19"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/sthom124\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/sthom124\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/sthom124\/wp-json\/wp\/v2\/users\/29355"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/sthom124\/wp-json\/wp\/v2\/comments?post=19"}],"version-history":[{"count":5,"href":"https:\/\/student.wp.odu.edu\/sthom124\/wp-json\/wp\/v2\/pages\/19\/revisions"}],"predecessor-version":[{"id":89,"href":"https:\/\/student.wp.odu.edu\/sthom124\/wp-json\/wp\/v2\/pages\/19\/revisions\/89"}],"up":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/sthom124\/wp-json\/wp\/v2\/pages\/15"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/sthom124\/wp-json\/wp\/v2\/media?parent=19"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}