SlideShare a Scribd company logo
1 of 11
RUNNING HEAD: SOCIOLOGICAL AUTOBIOGRAPHY
SOCIOLOGICAL AUTOBIOGRAPHY
Sociological Autobiography
SOC&101
Green River College
Winter 2019
Minjung Kim
I have bled many times in my life. Sometimes I bled from
accidents just like others, but many times, the bleeding was
intended. For several years, I hurt myself intentionally. I was
suicidal on some occasions. I cannot remember when I first
started self-harming because living a life distressed me since I
was very young. I was born in South Korea, and I grew up there
until I was 13 years old. Even though I was Korean myself and
spent my childhood there, I did not like living in Korea. When I
think about Korea, the first thing that pops up in my head is an
anguished memory of me getting bullied.
My experience of getting bullied started when I was in 2nd
grade in Elementary school. There was only one sole reason
why the students bullied me: I was fat. To make this clear, I was
not fat, but I was a little bit chubbier than others. However, the
standard of beauty is extremely high in Korea, and I did not
belong to the standard of desirable body shape. Therefore,
nobody wanted me to be with them, and they either bullied me
or avoided me. Having a fat body was a mark of disgrace for
me. I was stigmatized in a way because of my “obesity”; people
perceived me as devalued and discounted (Connor, 2014). The
social institution, the school, which is supposed to help the
students to get an education and to socialize, did not help me
out of this disaster, but instead, the teachers neglected the fact
and pretended they did not know. The intensity of bullying
varied. They started out as calling my name incorrectly because
they said calling my name would defile their tongues. They did
not want to have any form of contact or touch with me, and if
part of me touched part of them by accident, they would curse
and yell at me because they would have a bad day; I became an
expert in avoiding physical contact even in a little space. If they
were playing games and they had to do a dare, then they would
come up to me and punch me or make uncomfortable sexual
jokes. They pretended I was not there when I was right in front
of them and talking to them, they ripped my textbooks and notes
when I went to the bathroom, they made a group chat that most
students in the school were added just to send me a bunch of
curse words and offending sexual texts, etc. I used to love
running, but I do not run anymore because they would make fun
of me when I run. In fact, I hate running now. I hate to show
someone of me running.
Bullying never stopped even I became a middle schooler. What
hurt me the most was not all these actions from the ones who I
did not even know. It was the fact that friends I trusted the most
turned their backs on me. This bullying all started with my ex-
best friend who was popular, and those few people who became
my friends all left me and joined the others. They hurt me or
ignored me just like the other ones after they heard about my
reputation. They did not want to have the stigma of being
outsider’s friend because it could make them outsiders too.
They wanted to fit into the rest of the others who were insiders
so they can make certain of their conformity (McLeod 2016).
From this social impact, I struggled with some illnesses. I
suffered from insomnia because of the fear inside my mind that
they will haunt me down while I am sleeping. They used to
make “jokes” of killing me. They also have told me to kill
myself a couple of times because I was not supposed to born in
the first place. Even though it was just simply a joke to them, I
felt like they were giving me a sign to kill myself. I was
literally forced to suicide according to their words. They killed
me inside, and the rotten me inside developed to be a mental
disorder. I struggled with depression for a while. I went to a
mental hospital regularly to get therapy and counseling.
However, all these efforts did not make my life any better. I
sought for the ways to relieve my stress and anxiety, and the
method I found was to cut my flesh. It did not make me feel
better in the long run, but it made me feel the pain that could
help me to forget my internal pain.
Still, self-harm was not a solution to this problem. As I
was turning 14, I stepped on the land of the United States. Both
my parent and I thought it will be best for me to leave the
country. As long as I stay in Korea, I knew that I would have to
face this kind of situation again; I would have to live in the
same area due to my parents’ job locations, and the rumors
would chase me. Because I was in a country where nobody
knows me, I worked on impression management very hard. All
the peer and group pressures back in my country made me act in
conformity to with their principals so that I can “fit in,” because
I am really scared to be rejected by the group (McLeod, 2016). I
wanted to be a person that satisfies the people. I lost 20 pounds,
which made me look skinny enough, and I always put a smile on
even though I was sad. I never expressed my thoughts and
opinions but always agreed to the others. Because nobody knew
me, and because the US had loose beauty standard compared to
Korea which made people less judgmental towards one’s out
appearance, I was able to fit in the social institutions quickly.
People liked me because I was smart, cute, and kind, which
matched their criteria of being a desirable person.
As time passed by, I realized I was in the position where it
was harder for me to show my true self and show my feelings,
because I was one of those nicest girls in the school, and I
wanted to stay that way. People I met were unlike the people I
met in Korea. Even though I gained weight and was even fatter
than the past, they still loved me as a friend. Nevertheless, I
was being fake to others of my emotions and opinions because I
was hugely worried about my looking glass self. In addition, I
found myself getting attached to the others and cannot stand on
my own. There was no sense of “I,” as in pride or shame,
without its correlative sense of you, or he, or they (Cooley,
1902). I cared too much about my looking glass self, or about
what others think of me, so I put aside all my feelings and
freedom like I was chained to people. I continued to cut my
thighs and arms with a cutter. Even though I was not bullied by
the people, there was an emptiness deep inside my heart.
Although I had friends, I felt like I had no one who I can trust
or talk about my real emotions. As the pain took control over
my body, my loneliness and emptiness kept increasing inside of
me. It never went away until I got to know about my friend who
was sharing common pains.
I have a friend who is cheerful and sprightly. But recently,
I saw her wearing short sleeves since the weather was getting
hotter, and I saw the scars that I could see on my body. I mostly
wear long sleeves to hide the scars, and if I were wearing short
sleeves, then I would cover my scars somehow. I had low self-
esteem, and exposing my scars meant the same as exposing my
dark sides, and my built looking glass self definitely did not
allow it. I was surprised that she did not intentionally hide it,
and I just had to talk to her about it. She was opened to talk to
me about it, and talking to her about my pain gave me a comfort
that I never felt before. I could not even talk to my parents
about hurting myself, but I was able to talk to her. We shared
our pains, and it was consoling that I could find someone who
has similar pain as me. Even though it was only her, not a group
of people, I felt like I belonged to some kind of group through
this conversation. It made me realize how it is like to be in-
group.
I was never opened to talk about my inside struggles to
anyone, but after the conversation with my friend and getting
her support, I would say I am more confident to reveal my true
self to the people who I love and care about. I always tried so
hard on impression management, conformity, and looking glass
self, but now, I can be just me, not fake me. Even though what I
went through was tough and not fun at all, I appreciate my
experiences. Because of this experience, I know the world a
little more, and I learned the way to deal with some social
issues. I got to know why norms exist, which is because of
conformity, and I realized how stigma can defeat the person and
can possibly ruin their lives. However, I also learned that the
sense of belonging can console people and help people to find
themselves in the right place in this society. I am getting a
tattoo soon to cover my scars on my wrist so that I can be
reminded what I have been through and what I am capable of
handling. I am no longer suicidal, and will not be, because I
know that some people are willing to listen to me and are
supporting me. Now I feel like I am a little more set free from
my inner struggles that are hidden inside my mind.
References
Connor, D. P. (2014). Stigma and Stigma Management. In C. J.
Forsyth & H. Copes (Eds.), Encyclopedia of Social Deviance
(Vol. 2, pp. 691-694). Thousand Oaks, CA: SAGE Reference.
Retrieved from
http://link.galegroup.com.ezproxy.greenriver.edu/apps/doc/
CX6501000290/GVRL?u=au
bu98092&sid=GVRL&xid=40a6cb87
Cooley, C. H. (1902). Human Nature and the Social Order (pp.
179-185). New York, NY: Scribner’s.
McLeod, Saul. (2016). What is Conformity? SimplePsychology.
Retrieved from
https://www.simplypsychology.org/conformity.html
Running head: RESEARCH PAPER
1
RESEARCH PAPER
7
RESEARCH PAPER
Name of the Student: Poornima Devi Potula
Name of the Instructor : Dr. Ben Ayed
Course Code: (ITS834-53)
Date : 05/26/2019
Deception Technology
Deception technology is a group of security apparatuses as well
as methods that are designed to avoid a hacker who has already
arrived in the network from doing destruction. The technology
uses traps to lead astray the hacker as well as delay or avoid
him from going deeper into the system and reaching his
proposed goal.
The purpose of deception technology is to avoid a cybercriminal
that has accomplished to penetrate a network from doing any
noteworthy damage. The tools work by creating decoys or
deception traps that mimic authentic technology properties
throughout the infrastructure. These traps can run in a
cybernetic or real operating system atmosphere as well as
designed to trick the cybercriminal into thinking they have
exposed a method to escalate privileges as well as steal
authorizations (Suk, Kwan & Hyun, 2018).How Deception
Technology Works
As a case, in fact, imagine the prehistoric city of Troy behind
its barriers. The Greeks pretend to departure as well as leave a
large horse by the entrances. The Trojans take it private.
Privileged the horse, the Greeks catch the Trojans carousing as
well as ultimately falling into a drunken torpor. They carefully
exit the horse, intent on massacring the protectors as well as
opening the gateways to let their army inside. In its place, they
find themselves inside a well-guarded compound. They are
taken in prison. The Trojans then expose the gates briefly to
stand-in the Greek defense force to advance. When they do so,
the gateways are protected as well as arrows rain down on the
unprotected enemy. As a result, a fully different type of
Homer's The Iliad. Such a triumph over a covert hacker is one
of the objectives of deception applications.Usage of Deception
Technology
Early Post-Breach Detection
No security key can stop all attacks from occurring on a system,
but deception technology aids to give attackers a wrong sense of
safety by making them trust they have gained a toehold on the
network.
Reduced False Positives and Risk
Dead ends, false positives, as well as alert exhaustion, can all
hamper safety efforts as well as put a drain on properties if they
are even investigated at all. Deception technology diminishes
the noise with less false positives as well as high loyalty alerts
packed full of valuable data.
Scale and Automate at Will
While the risk to corporate systems as well as information is a
regular growing concern, safety teams rarely obtain an increase
in their budget to access the deluge of new intimidations. For
this cause, deception technology can be a very comfortable
resolution (Wang et al., 2018).
From Legacy to IoT
Deception technology can be used to deliver breadcrumbs for a
huge range of dissimilar devices, counting legacy surroundings,
industry-specific atmospheres as well as IoT devices.The
Importance of Dynamic Deception
One of the most significant necessities for effective deception
technology application is that it must stay vague as well as new
to the hacker. If the hacker suspects they are being cuckolded
they will do what they can to avoid traps as well as increase
their labors in getting to the real possessions. Numerous
deception safety solutions have machine learning as well as
Artificial Intelligence built into their fundamental. These
structures not only confirm deception methods are kept dynamic
but also assist to decrease operational overheads as well as the
influence on safety teams by freeing them from continually
creating new deception movements.Deception in depth
Just as the enduring security chant has been a guard in depth,
security specialists recommend deception in depth. It seems the
deployment of these methods along the complete attack chain.
When hackers are leading the investigation of the network as
well as enterprise weak facts, feed them false data on the
topography as well as assets. If they are previously inside as
well as figuring out what apparatuses to use, delay their
deployment with false data. Trick them into sandboxes as well
as keep them engaged there for long epochs. Users can choose
from separate DDP apparatuses or those that are combined into
enterprise safety solutions for detection answer. For instance,
some are joint with instrumentation, network access control or
intelligence distribution tools (He et al., 2018).
Deception based detection using reliable traps highlights both
internal as well as external attacks.
Type of Activities Do Deception Systems Detect
State of the art deception systems identify an extensive
diversity of threats and aren’t needful on known signs, database
lookups, or pattern matching: Credential Theft, Lateral
movement, Attacks on directory systems, Man-in-the-middle,
Sensitive data, Geo-fencing, etc.Deception technology vendors
and tools
While practical for positive attack trajectories, these approaches
have their boundaries. Pingree suggested they ought to be
augmented with DPP apparatuses, which are progressively
gaining in maturity as well as functionality. There are numerous
sellers operating in this space (Kim, 2019). The list contains:
· Illusive Networks
· Attivo Networks
· Cymmetria
· Acalvio
· GuardiCore
· CyberTrap
· Specter
· TopSpin Security
· TrapXPutting Deception into Practice
There are an extensive array of deception strategies available to
enterprises. But before tapping these to use, businesses ought to
understand what makes deception most operative. Those are as
follows
· Deception must be authentic
· Deception must be comprehensive
· Deception must be scalableBenefits of Using Deception
· Reduction in resides time as well as the mean time to
recognition and remediation as well.
· High-fidelity warnings that simplify as well as accelerate
incident reply, while removing alert exhaustion.
· Through the appointment, it delivers deeper forensics of
adversary intelligence with Indicators of Compromise (IOCs)
and Tactics, Techniques, and Procedures (TTPs).
· It is also not dependent on knowing each attack vector or
technique as well as it is intended to notice early investigation,
credential theft, and lateral measure (Bushby, 2019).
· Gain discernibility to device adds as well as changes on a
system and at risk identifications so that everyone can alleviate
risk as well as decrease the attack surface the assailant is
pointing.The future of deception technology
DPP tools, though, has a method to go to enter the majority, and
for now, the market is comparatively small. Gartner imagines no
more than 10 percent of enterprises will be using it aggressively
by the subsequent year. Among the probable candidates are
economic services, healthcare, government, and software
verticals.
References:
Bushby, A. (2019). How deception can change cyber security
defences. Computer Fraud & Security, 2019(1), 12-14.
He, W., Gao, X., Zhong, W., & Qian, F. (2018). Secure
impulsive synchronization control of multi-agent systems under
deception attacks. Information Sciences, 459, 354-368.
Kim, Y. G. (2019, January). Deception Tree Model for Cyber
Operation. In 2019 International Conference on Platform
Technology and Service (PlatCon) (pp. 1-4). IEEE.
Suk, L. J., Kwan, C. J., & Hyun, J. S. (2018). RESEARCH TO
VERIFY AND UTILIZE PSYCHOPHYSIOLOGICAL
DETECTION OF DECEPTION BASED ON VIBRAIMGE
TECHNOLOGY. ELSYS Corp., European Academy of Natural
Sciences (EANS), Russian Biometric Association (RBA), AI
Burnazyan Federal Medical and Bio, 159.
Wang, Z., Wu, X., Liu, C., Liu, Q., & Zhang, J. (2018, June).
RansomTracer: exploiting cyber deception for ransomware
tracing. In 2018 IEEE Third International Conference on Data
Science in Cyberspace (DSC) (pp. 227-234). IEEE.
RUNNING HEAD SOCIOLOGICAL AUTOBIOGRAPHYSOCIOLOGICAL AUTOB.docx

More Related Content

More from todd521

Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docxtodd521
 
Running head SEMESTER PAPER .docx
Running head SEMESTER PAPER                                  .docxRunning head SEMESTER PAPER                                  .docx
Running head SEMESTER PAPER .docxtodd521
 
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docxRunning Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docxtodd521
 
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docxRunning Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docxtodd521
 
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docxRunning head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docxtodd521
 
Running Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docxRunning Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docxtodd521
 
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docxRunning Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docxtodd521
 
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docxRunning head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docxtodd521
 
Running head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docxRunning head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docxtodd521
 
Running head SETTING UP COMPANY 1SETTING UP .docx
Running head SETTING UP COMPANY                 1SETTING UP .docxRunning head SETTING UP COMPANY                 1SETTING UP .docx
Running head SETTING UP COMPANY 1SETTING UP .docxtodd521
 
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docxRunning head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docxtodd521
 
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docxRunning Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docxtodd521
 
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docxRunning Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docxtodd521
 
Running Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docxRunning Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docxtodd521
 
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docxRunning head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docxtodd521
 
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docxRunning head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docxtodd521
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxtodd521
 
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxRunning head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxtodd521
 
Running head SCHIZOPHRENIA .docx
Running head SCHIZOPHRENIA                                       .docxRunning head SCHIZOPHRENIA                                       .docx
Running head SCHIZOPHRENIA .docxtodd521
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxtodd521
 

More from todd521 (20)

Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
 
Running head SEMESTER PAPER .docx
Running head SEMESTER PAPER                                  .docxRunning head SEMESTER PAPER                                  .docx
Running head SEMESTER PAPER .docx
 
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docxRunning Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
 
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docxRunning Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
 
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docxRunning head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
 
Running Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docxRunning Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docx
 
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docxRunning Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
 
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docxRunning head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
 
Running head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docxRunning head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docx
 
Running head SETTING UP COMPANY 1SETTING UP .docx
Running head SETTING UP COMPANY                 1SETTING UP .docxRunning head SETTING UP COMPANY                 1SETTING UP .docx
Running head SETTING UP COMPANY 1SETTING UP .docx
 
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docxRunning head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
 
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docxRunning Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
 
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docxRunning Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
 
Running Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docxRunning Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docx
 
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docxRunning head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
 
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docxRunning head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
 
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxRunning head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
 
Running head SCHIZOPHRENIA .docx
Running head SCHIZOPHRENIA                                       .docxRunning head SCHIZOPHRENIA                                       .docx
Running head SCHIZOPHRENIA .docx
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

RUNNING HEAD SOCIOLOGICAL AUTOBIOGRAPHYSOCIOLOGICAL AUTOB.docx

  • 1. RUNNING HEAD: SOCIOLOGICAL AUTOBIOGRAPHY SOCIOLOGICAL AUTOBIOGRAPHY Sociological Autobiography SOC&101 Green River College Winter 2019 Minjung Kim I have bled many times in my life. Sometimes I bled from accidents just like others, but many times, the bleeding was intended. For several years, I hurt myself intentionally. I was suicidal on some occasions. I cannot remember when I first started self-harming because living a life distressed me since I was very young. I was born in South Korea, and I grew up there until I was 13 years old. Even though I was Korean myself and spent my childhood there, I did not like living in Korea. When I think about Korea, the first thing that pops up in my head is an anguished memory of me getting bullied. My experience of getting bullied started when I was in 2nd grade in Elementary school. There was only one sole reason why the students bullied me: I was fat. To make this clear, I was not fat, but I was a little bit chubbier than others. However, the
  • 2. standard of beauty is extremely high in Korea, and I did not belong to the standard of desirable body shape. Therefore, nobody wanted me to be with them, and they either bullied me or avoided me. Having a fat body was a mark of disgrace for me. I was stigmatized in a way because of my “obesity”; people perceived me as devalued and discounted (Connor, 2014). The social institution, the school, which is supposed to help the students to get an education and to socialize, did not help me out of this disaster, but instead, the teachers neglected the fact and pretended they did not know. The intensity of bullying varied. They started out as calling my name incorrectly because they said calling my name would defile their tongues. They did not want to have any form of contact or touch with me, and if part of me touched part of them by accident, they would curse and yell at me because they would have a bad day; I became an expert in avoiding physical contact even in a little space. If they were playing games and they had to do a dare, then they would come up to me and punch me or make uncomfortable sexual jokes. They pretended I was not there when I was right in front of them and talking to them, they ripped my textbooks and notes when I went to the bathroom, they made a group chat that most students in the school were added just to send me a bunch of curse words and offending sexual texts, etc. I used to love running, but I do not run anymore because they would make fun of me when I run. In fact, I hate running now. I hate to show someone of me running. Bullying never stopped even I became a middle schooler. What hurt me the most was not all these actions from the ones who I did not even know. It was the fact that friends I trusted the most turned their backs on me. This bullying all started with my ex- best friend who was popular, and those few people who became my friends all left me and joined the others. They hurt me or ignored me just like the other ones after they heard about my reputation. They did not want to have the stigma of being outsider’s friend because it could make them outsiders too. They wanted to fit into the rest of the others who were insiders
  • 3. so they can make certain of their conformity (McLeod 2016). From this social impact, I struggled with some illnesses. I suffered from insomnia because of the fear inside my mind that they will haunt me down while I am sleeping. They used to make “jokes” of killing me. They also have told me to kill myself a couple of times because I was not supposed to born in the first place. Even though it was just simply a joke to them, I felt like they were giving me a sign to kill myself. I was literally forced to suicide according to their words. They killed me inside, and the rotten me inside developed to be a mental disorder. I struggled with depression for a while. I went to a mental hospital regularly to get therapy and counseling. However, all these efforts did not make my life any better. I sought for the ways to relieve my stress and anxiety, and the method I found was to cut my flesh. It did not make me feel better in the long run, but it made me feel the pain that could help me to forget my internal pain. Still, self-harm was not a solution to this problem. As I was turning 14, I stepped on the land of the United States. Both my parent and I thought it will be best for me to leave the country. As long as I stay in Korea, I knew that I would have to face this kind of situation again; I would have to live in the same area due to my parents’ job locations, and the rumors would chase me. Because I was in a country where nobody knows me, I worked on impression management very hard. All the peer and group pressures back in my country made me act in conformity to with their principals so that I can “fit in,” because I am really scared to be rejected by the group (McLeod, 2016). I wanted to be a person that satisfies the people. I lost 20 pounds, which made me look skinny enough, and I always put a smile on even though I was sad. I never expressed my thoughts and opinions but always agreed to the others. Because nobody knew me, and because the US had loose beauty standard compared to Korea which made people less judgmental towards one’s out appearance, I was able to fit in the social institutions quickly. People liked me because I was smart, cute, and kind, which
  • 4. matched their criteria of being a desirable person. As time passed by, I realized I was in the position where it was harder for me to show my true self and show my feelings, because I was one of those nicest girls in the school, and I wanted to stay that way. People I met were unlike the people I met in Korea. Even though I gained weight and was even fatter than the past, they still loved me as a friend. Nevertheless, I was being fake to others of my emotions and opinions because I was hugely worried about my looking glass self. In addition, I found myself getting attached to the others and cannot stand on my own. There was no sense of “I,” as in pride or shame, without its correlative sense of you, or he, or they (Cooley, 1902). I cared too much about my looking glass self, or about what others think of me, so I put aside all my feelings and freedom like I was chained to people. I continued to cut my thighs and arms with a cutter. Even though I was not bullied by the people, there was an emptiness deep inside my heart. Although I had friends, I felt like I had no one who I can trust or talk about my real emotions. As the pain took control over my body, my loneliness and emptiness kept increasing inside of me. It never went away until I got to know about my friend who was sharing common pains. I have a friend who is cheerful and sprightly. But recently, I saw her wearing short sleeves since the weather was getting hotter, and I saw the scars that I could see on my body. I mostly wear long sleeves to hide the scars, and if I were wearing short sleeves, then I would cover my scars somehow. I had low self- esteem, and exposing my scars meant the same as exposing my dark sides, and my built looking glass self definitely did not allow it. I was surprised that she did not intentionally hide it, and I just had to talk to her about it. She was opened to talk to me about it, and talking to her about my pain gave me a comfort that I never felt before. I could not even talk to my parents about hurting myself, but I was able to talk to her. We shared our pains, and it was consoling that I could find someone who has similar pain as me. Even though it was only her, not a group
  • 5. of people, I felt like I belonged to some kind of group through this conversation. It made me realize how it is like to be in- group. I was never opened to talk about my inside struggles to anyone, but after the conversation with my friend and getting her support, I would say I am more confident to reveal my true self to the people who I love and care about. I always tried so hard on impression management, conformity, and looking glass self, but now, I can be just me, not fake me. Even though what I went through was tough and not fun at all, I appreciate my experiences. Because of this experience, I know the world a little more, and I learned the way to deal with some social issues. I got to know why norms exist, which is because of conformity, and I realized how stigma can defeat the person and can possibly ruin their lives. However, I also learned that the sense of belonging can console people and help people to find themselves in the right place in this society. I am getting a tattoo soon to cover my scars on my wrist so that I can be reminded what I have been through and what I am capable of handling. I am no longer suicidal, and will not be, because I know that some people are willing to listen to me and are supporting me. Now I feel like I am a little more set free from my inner struggles that are hidden inside my mind. References Connor, D. P. (2014). Stigma and Stigma Management. In C. J. Forsyth & H. Copes (Eds.), Encyclopedia of Social Deviance (Vol. 2, pp. 691-694). Thousand Oaks, CA: SAGE Reference. Retrieved from http://link.galegroup.com.ezproxy.greenriver.edu/apps/doc/ CX6501000290/GVRL?u=au bu98092&sid=GVRL&xid=40a6cb87 Cooley, C. H. (1902). Human Nature and the Social Order (pp. 179-185). New York, NY: Scribner’s. McLeod, Saul. (2016). What is Conformity? SimplePsychology. Retrieved from
  • 6. https://www.simplypsychology.org/conformity.html Running head: RESEARCH PAPER 1 RESEARCH PAPER 7 RESEARCH PAPER Name of the Student: Poornima Devi Potula Name of the Instructor : Dr. Ben Ayed Course Code: (ITS834-53) Date : 05/26/2019 Deception Technology Deception technology is a group of security apparatuses as well as methods that are designed to avoid a hacker who has already arrived in the network from doing destruction. The technology uses traps to lead astray the hacker as well as delay or avoid him from going deeper into the system and reaching his proposed goal. The purpose of deception technology is to avoid a cybercriminal that has accomplished to penetrate a network from doing any noteworthy damage. The tools work by creating decoys or deception traps that mimic authentic technology properties
  • 7. throughout the infrastructure. These traps can run in a cybernetic or real operating system atmosphere as well as designed to trick the cybercriminal into thinking they have exposed a method to escalate privileges as well as steal authorizations (Suk, Kwan & Hyun, 2018).How Deception Technology Works As a case, in fact, imagine the prehistoric city of Troy behind its barriers. The Greeks pretend to departure as well as leave a large horse by the entrances. The Trojans take it private. Privileged the horse, the Greeks catch the Trojans carousing as well as ultimately falling into a drunken torpor. They carefully exit the horse, intent on massacring the protectors as well as opening the gateways to let their army inside. In its place, they find themselves inside a well-guarded compound. They are taken in prison. The Trojans then expose the gates briefly to stand-in the Greek defense force to advance. When they do so, the gateways are protected as well as arrows rain down on the unprotected enemy. As a result, a fully different type of Homer's The Iliad. Such a triumph over a covert hacker is one of the objectives of deception applications.Usage of Deception Technology Early Post-Breach Detection No security key can stop all attacks from occurring on a system, but deception technology aids to give attackers a wrong sense of safety by making them trust they have gained a toehold on the network. Reduced False Positives and Risk Dead ends, false positives, as well as alert exhaustion, can all hamper safety efforts as well as put a drain on properties if they are even investigated at all. Deception technology diminishes the noise with less false positives as well as high loyalty alerts packed full of valuable data.
  • 8. Scale and Automate at Will While the risk to corporate systems as well as information is a regular growing concern, safety teams rarely obtain an increase in their budget to access the deluge of new intimidations. For this cause, deception technology can be a very comfortable resolution (Wang et al., 2018). From Legacy to IoT Deception technology can be used to deliver breadcrumbs for a huge range of dissimilar devices, counting legacy surroundings, industry-specific atmospheres as well as IoT devices.The Importance of Dynamic Deception One of the most significant necessities for effective deception technology application is that it must stay vague as well as new to the hacker. If the hacker suspects they are being cuckolded they will do what they can to avoid traps as well as increase their labors in getting to the real possessions. Numerous deception safety solutions have machine learning as well as Artificial Intelligence built into their fundamental. These structures not only confirm deception methods are kept dynamic but also assist to decrease operational overheads as well as the influence on safety teams by freeing them from continually creating new deception movements.Deception in depth Just as the enduring security chant has been a guard in depth, security specialists recommend deception in depth. It seems the deployment of these methods along the complete attack chain. When hackers are leading the investigation of the network as well as enterprise weak facts, feed them false data on the topography as well as assets. If they are previously inside as well as figuring out what apparatuses to use, delay their deployment with false data. Trick them into sandboxes as well as keep them engaged there for long epochs. Users can choose from separate DDP apparatuses or those that are combined into enterprise safety solutions for detection answer. For instance, some are joint with instrumentation, network access control or intelligence distribution tools (He et al., 2018).
  • 9. Deception based detection using reliable traps highlights both internal as well as external attacks. Type of Activities Do Deception Systems Detect State of the art deception systems identify an extensive diversity of threats and aren’t needful on known signs, database lookups, or pattern matching: Credential Theft, Lateral movement, Attacks on directory systems, Man-in-the-middle, Sensitive data, Geo-fencing, etc.Deception technology vendors and tools While practical for positive attack trajectories, these approaches have their boundaries. Pingree suggested they ought to be augmented with DPP apparatuses, which are progressively gaining in maturity as well as functionality. There are numerous sellers operating in this space (Kim, 2019). The list contains: · Illusive Networks · Attivo Networks · Cymmetria · Acalvio · GuardiCore · CyberTrap · Specter · TopSpin Security · TrapXPutting Deception into Practice There are an extensive array of deception strategies available to enterprises. But before tapping these to use, businesses ought to understand what makes deception most operative. Those are as follows · Deception must be authentic · Deception must be comprehensive · Deception must be scalableBenefits of Using Deception · Reduction in resides time as well as the mean time to recognition and remediation as well. · High-fidelity warnings that simplify as well as accelerate incident reply, while removing alert exhaustion. · Through the appointment, it delivers deeper forensics of adversary intelligence with Indicators of Compromise (IOCs)
  • 10. and Tactics, Techniques, and Procedures (TTPs). · It is also not dependent on knowing each attack vector or technique as well as it is intended to notice early investigation, credential theft, and lateral measure (Bushby, 2019). · Gain discernibility to device adds as well as changes on a system and at risk identifications so that everyone can alleviate risk as well as decrease the attack surface the assailant is pointing.The future of deception technology DPP tools, though, has a method to go to enter the majority, and for now, the market is comparatively small. Gartner imagines no more than 10 percent of enterprises will be using it aggressively by the subsequent year. Among the probable candidates are economic services, healthcare, government, and software verticals. References: Bushby, A. (2019). How deception can change cyber security defences. Computer Fraud & Security, 2019(1), 12-14. He, W., Gao, X., Zhong, W., & Qian, F. (2018). Secure impulsive synchronization control of multi-agent systems under deception attacks. Information Sciences, 459, 354-368. Kim, Y. G. (2019, January). Deception Tree Model for Cyber Operation. In 2019 International Conference on Platform Technology and Service (PlatCon) (pp. 1-4). IEEE. Suk, L. J., Kwan, C. J., & Hyun, J. S. (2018). RESEARCH TO VERIFY AND UTILIZE PSYCHOPHYSIOLOGICAL DETECTION OF DECEPTION BASED ON VIBRAIMGE TECHNOLOGY. ELSYS Corp., European Academy of Natural Sciences (EANS), Russian Biometric Association (RBA), AI Burnazyan Federal Medical and Bio, 159. Wang, Z., Wu, X., Liu, C., Liu, Q., & Zhang, J. (2018, June). RansomTracer: exploiting cyber deception for ransomware tracing. In 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC) (pp. 227-234). IEEE.