Hello! My name is Andrew Byrd, and I am a freshman here at Old Dominion University. My intended major is Cybersecurity and I hope to pursue this field of work in the future. I first got interested in this field when I heard about cybercrimes dealing with fraudulent activities, this interested me and made me want to learn more about the subject. I hope to continue to learn and grow in this field

Discussion 1

Name- Andrew Byrd

Where I am from- Woodbridge Virginia

Year- Freshman

Major- Cybersecurity

Career Goal- Work for the government

Hobbies- Hanging out and playing sports

Discussion 2

The framework is the primary structure required to support and direct the development of the cybersecurity building set of operations. All sectors of vital infrastructure have similar goals. It is made up of five continuous and concurrent functions:  Identify, Protect, Detect, Respond and Recover.

Identify- is to create an understanding of what’s going on to manage cybersecurity risk to systems and data. establishes the foundation for future cybersecurity initiatives taken by your company. Success with the Framework depends on understanding what exists, what dangers are connected to those settings, and how it connects to your business objectives.

Protect-  The Protect Function supports the ability to contain the impact of a potential cybersecurity event. In accordance with relevant rules, procedures, and agreements, technical security solutions are managed to guarantee the security and resilience of systems and assets.

Detect- The Detect Function defines the appropriate activities to identify the occurrence of a cybersecurity event. The Detect Function enables timely discovery of cybersecurity events. Ensuring events are detected, and their potential impact is understood. Implementing Security and continuous monitoring capabilities to monitor cybersecurity events and verify the effectiveness of protective measures including network and physical activities.  

Respond- supports the ability to contain the impact of a potential cybersecurity incident. Examples of outcome Categories within this Function include Response Planning, Communications, Analysis, Mitigation, and Improvements.

Recover- Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cyber security event.

Discussion 3

  1. Briefly define each of the three members of the information security triad.

CIA- Confidentiality protects people sensitive and private information from unauthorized access. Integrity ensures that damage can be undone in the event that an authorized person makes a change that shouldn’t have been made. Availability is the act of computing resources with architectures specifically tailored to increase availability and are known as high availability systems. 

  2.  What does the term authentication mean?

Verifying the identification of a user.

  3. What is multi-factor authentication?

A process that requires multiple steps to ensure the verification is valid.

  4.  What is role-based access control?

The concept of allowing users access depending on their position inside a company. 

  5. What is the purpose of encryption, and fundamentally how does it work?

Information into a secret code that can only be opened with a special digital key in order to avoid data from being lost, altered, or compromised.

  6. What is pretexting and how does it represent a threat in the Cybersecurity landscape?

Pretexting is a manipulative social engineering tactic used by bad actors to persuade people into disclosing private information.

7. What’s the point in backups & what are the components of a good backup plan?

 backup should lead to a quick recovery of at least mission-critical information

8. What is a firewall?

network security device that observe incoming and outgoing network traffic and decides whether to allow or block it

 9.Discuss various types of Firewalls.

Hardware firewall is a physical device like a server, that filters the traffic going to a computer. A software firewall filters data by checking to see if its behavior fits the profile of a malicious code. 

10. What does the term physical security mean and how does it apply to Cybersecurity?

The protection of personnel, hardware, software, and data from physical actions and events that could cause serious loss or damage

Discussion 4

Hacking is the process of discovering and taking advantage of the holes in a computer system or network, usually in order to obtain illegal access to information pertaining to an individual or an organization. Although hacking isn’t necessarily a bad thing, its link with cybercrime has given the phrase a bad reputation. Hackers use a technique called social engeneering which is intended to take advantage of human error to get personal data. Hackers have the ability to deceive you into disclosing personal or financial information by using numerous psychological techniques and a false identity. To do this, they might use scams such as spam emails or instant chats, or even fake websites.

Malicious code is any code that harms a computer system or network is considered malicious code. This covers ransomware, bugs, Trojan horses, logic bombs, and other harmful software. Threat actors employ malicious code as a means of communication with computers. 

Phishing is a form of cybercrime where a person pretending to be a legitimate organization contacts a target or targets through email, phone, or text message in an attempt to trick them into revealing sensitive information, including passwords, banking and credit card information, and personally identifiable information. The data is then utilized to gain access to significant accounts, which may lead to financial loss and identity theft.

It is very important to understand these forms of cyber threats so that we can be sure to avoid them. I feel like everyone should be informed on these so that they don’t fall for these traps.

https://www.sangfor.com/glossary/cybersecurity/what-is-malicious-code#:~:text=Malicious%20code%20is%20any%20type,actors%20to%20communicate%20with%20computers.Links to an external site.

https://www.phishing.org/what-is-phishing

https://usa.kaspersky.com/resource-center/definitions/what-is-hacking#:~:text=Hacking%20is%20the%20act%20of,to%20its%20association%20with%20cybercrime.

Discussion 5

Industrial cybersecurity refers to the protection of industrial control systems. These systems, which manage essential facilities and procedures, are frequently seen in areas including manufacturing, energy, transportation, and utilities. Industrial cybersecurity seeks to protect these systems against unapproved access, disruption, or manipulation that can result in risks to public health and safety, delays in production, monetary losses, or even environmental harm. Because industrial cyber attacks are becoming more widespread, industrial enterprises must recognize and evaluate the risks linked to industrial cyberattacks, as well as establish the right guidelines, processes, and employee education to control these risks lessens the possibility that any breaches will negatively affect their company. Experts in cybersecurity often claim that industrial settings are not adequately secured. unbiased and based on their experience viewpoint, they claim that businesses frequently underestimate the significance of cyberthreats and develop real security measures after a breach has happened. Businesses usually anticipate incidents brought on by weaknesses in their external partners. Infrastructure and other external system networks, and as a result, are inadequately equipped for possible dangers originating from the networks of their affiliated companies. Majority instances were produced by traditional malware and virus outbreaks, which also served as the primary focus for the organizations interviewed. According to the report, targeted attacks are understood to vary from common malware infections like spear phishing to more sophisticated complex APTs, or Advanced Persistent Threats. I think that while businesses make significant investments in cybersecurity measures, such as strong defenses, frequent risk assessments, staff development, and incident response strategies. Other firms, on the other hand, might not be as aware of how serious the threat is or might not have the means and know-how to put in place adequate cybersecurity safeguards. Furthermore, because cyber dangers are constantly changing, firms must be able to adjust and adapt.

Discussion 6

As the use of internet continues to grow, the rate of cybercrimes will continue to grow as well. Small business are a large target for hackers, “Fifty percent of small to medium-sized businesses (SMB) have been the victims of cyber attack and over 60% of those attacked go out of business.” -Dr.Jane LeClair. Attacks against small businesses are growing as a result of their basic ways of stopping hackers from obtaining bank account and credit card information. Because their systems are weak, it makes it easier for these hackers to find the supplier networks, personal, and financial information about employees. 
Businesses typically have less secure websites. Additionally, they are using cloud services which might not employ strong enough security technology to do more business online.For a small firm, cybercrime can have disastrous repercussions.  In 2013, the average cost of a cyberattack on a small business was $8,699. That amount has now skyrocketed to $20,752 per attack. The growing of phishing and hacking operations, along with a better economy that finds more money available in small bank accounts than there was just two years ago, are likely to blame for this enormous spike in costs. In order to help with these hackers I think that it would be necessary for these small businesses to limit their employees access to data and information, Install and activate software and hardware firewalls, and use encryption for sensitive business information.

Discussion 7

Part 1: Inclusive Identity models- Identity management systems are changing to take into account a wider range of demographics, such as physical abilities, cultural origins, and gender identities. Conventional identity systems often found it difficult to accurately portray people who did not fit into binary gender norms or whose names did not follow Western naming practices. But modern identity management systems are becoming more and more flexible and customizable, enabling people to express themselves more authentically. For example, several platforms now allow users to choose identities that more accurately represent how they see themselves by providing a variety of gender options beyond just male and female. Geographical differences in identity management- The methods used for identity management can differ greatly between different geographic locations due to cultural, technological, and legal reasons. The following two major patterns show how the US differs from other parts of the world.

Part 2: FIDO, which stands for Fast Identity Online, is an open industry association formed to address the problem of password-based authentication and to promote the adoption of simpler, stronger authentication methods. The overall goal of FIDO is to improve protection against illegal access to digital accounts and services by reducing the need for passwords and establishing a more convenient, secure, and user-friendly authentication ecosystem. In order to solve these issues, FIDO encourages the use of more robust authentication methods that rely on biometrics and public key cryptography. Without using passwords, devices like security keys and cellphones may securely authenticate users thanks to the FIDO specifications. These authentication techniques improve user experience and compatibility  across different devices and services, all while providing higher security guarantees.

Discussion 8

Cryptography is a fundamental component of secure communication and data security, guaranteeing reliability and authenticity on a variety of digital platforms. Individuals as well as organizations are able to verify the identity of people involved and confirm the integrity of transmitted data using cryptographic techniques. Digital signatures are one important cryptographic tool for authenticity. Asymmetric encryption is used by digital signatures to link a special identity to a communication or document, guaranteeing its integrity and origin. In order to confirm the sender’s identity and guarantee that the data hasn’t been altered in transit, the sender encrypts data with a private key and creates a signature that can only be decrypted with the matching public key.

Also, by producing fixed-size outputs from unlimited inputs, cryptographic hash functions support data integrity. The hash value is drastically altered by even little changes in the input data, making it computationally impossible for attackers to alter data without being discovered. Recipients can determine whether data is intact by comparing hash values before and after delivery. Blockchain technology uses cryptography to keep a permanent record of all transactions. A blockchain’s blocks are connected by encryption using the previous block’s hash, which creates a chain that links all of the transactions. This preserves the legitimacy of the ledger by guaranteeing the integrity of the complete transaction history because tampering with one block will invalidate future ones.

So, by preserving authenticity and integrity, cryptography acts as a cornerstone for building trust and security in digital interactions. Cryptographic approaches offer strong mechanisms to ensure data transmission integrity, recognize abuse, and validate identities, whether through hash functions, digital signatures, or blockchain technology.

Discussion 9

Cyber technology has completely changed the way engineering systems are designed, operated, and maintained in a variety of fields. Automation and control are two key areas of influence. Engineering systems can be better monitored, controlled, and optimized thanks to the integration of computational algorithms and physical processes made possible by cyber-physical systems. Because of this convergence, real-time modifications based on data analytics are made easier, increasing dependability and efficiency.Also, the development of modeling and simulation approaches has been accelerated by cyber technology. Today’s engineers may create virtual prototypes and run simulations to test different situations, which drastically cuts down on the time and expense of traditional physical prototyping. This feature promotes quick iterations and advancements by quickening the invention cycle.

The Internet of Things and Industrial Internet of Things have also been made possible by the interconnectedness of cyber technology, allowing for easy data interchange and communication between networked systems and devices. More coordination, resource efficiency, and compatibility among engineering systems are made possible by this link, which promotes more integrated and flexible operations. But the growing reliance on cyber technology also brings with it new difficulties, primary among them cybersecurity threats. Cyber risks including hacking, data leaks, and sabotage can jeopardize the safety, integrity, and confidentiality of engineering systems. Strong cybersecurity procedures, including as intrusion detection systems, authentication, and encryption, are required to address these concerns.

To sum up, cyber technology has completely changed engineering processes and presented previously unheard-of chances for productivity, creativity, and connectivity. Engineers must, however, address cybersecurity issues in order to guarantee the dependability and security of these systems in an increasingly digital environment if they are to fully realize its benefits.

Discussion 10

SCADA systems are essential for managing and controlling a wide range of industrial operations, including manufacturing, transportation, and power generation and distribution. SCADA systems are required in order to effectively automate, monitor, and control complex operations from a distance. These systems do, however, also have a number of vulnerabilities that could seriously risk vital operations and infrastructure.

First, SCADA systems frequently function in settings where security may not have been the top priority throughout the systems’ conception and deployment. They might not have strong security measures in place as a result, leaving them vulnerable to cyberattacks. Threat actors can obtain unauthorized access to SCADA networks by taking advantage of flaws in old software, unsecured communication protocols, and inadequate authentication systems.

Second, SCADA systems are susceptible to cascading failures due to their networked nature. If an attack on one area of the system is successful, it may propagate across the entire network, causing extensive damage and disruptions. For instance, a cyberattack on a SCADA system for the power grid may cause outages that impact wide regions.

There are also new hazards associated with SCADA systems’ growing internet access. Although connection has advantages like remote maintenance and monitoring, it also increases the attack surface, giving bad actors more chances to take advantage of weaknesses.

Furthermore, there can be serious repercussions from SCADA system breaches, such as dangers to national security and public safety in addition to monetary losses and operational interruptions. Consequently, it is essential that businesses adopt strong cybersecurity steps to reduce the risks associated with SCADA systems and protect vital infrastructure and industrial processes, such as frequent security assessments, network segmentation, intrusion detection systems, and employee training.

Discussion 11

There is a significant connection between cybercrime and criminal justice in today’s world. Cybercrime is the term for illegal actions committed online or through computers, including identity theft, phishing, hacking, and cyberterrorism. On the other side, criminal justice refers to the set of procedures and establishments within governments that are meant to maintain social order, discourage and lessen criminal activity, and punish lawbreakers. 

Cybercrimes are investigated and prosecuted by law enforcement organizations that are part of the criminal justice system. To do this, digital evidence must be gathered, examined, and used to identify offenders and compile evidence against them. The criminal justice system is in charge of passing cybercrime-related legislation and regulations. This entails defining cybercrimes, determining the consequences for violators, and putting policies in place to stop and neutralize cyberthreats. International cooperation is necessary because cybercrimes frequently cross national boundaries, necessitating coordination between governments and law enforcement organizations in several nations. In order to combat cyber threats and extradite cybercriminals, international coordination is made possible in large part by the criminal justice system. Criminal justice organizations endeavor to evaluate the threats that cybercrimes provide and create plans to keep them at bay. This could entail putting security measures in place inside government and commercial sector institutions, educating the public about cybersecurity best practices, and doing threat assessments to find potential weaknesses. 

All things considered, the connection between cybercrime and criminal justice highlights how multidisciplinary tackling today’s criminal challenges must be. Collaboration across multiple disciplines is necessary for law enforcement agencies, technical specialists, legal professionals, policymakers, and other stakeholders to effectively respond to cybercrimes.

Discussion 12

The changes in technology have affected and continue to affect the definitions of appropriate and inappropriate behavior. The issue of CS and CH are current problems and have sparked the interest of criminologist. “In a discussion of the extent of CS, the Department of Justice (1999) reported
that approximately 20% of stalking cases in Los Angeles and 40% of the stalking cases in New York utilized the Internet as the mediums for these criminal acts. According to a recent study, approximately 40% of college students have been victims of CS at some point in their lives” (Reyns et al., 2012). I think that it is important to note that things such as social media and other messaging apps have caused us to be  more easily stalked and harassed, our information is now more public than its ever been and you never know if you could be the next viral or trending topic. Using technology and social media is normal today, almost everyone uses it from young kids to grandparents. Social media has opened a gateway to talking to people and interacting with others like never before so now it’s hard to tell the definition of what’s ok and what’s not. It is so easy now to talk to a stranger whether its a creep or its someone famous that you DM, you never know who is truly on the other side of the phone or what they may do with the information they find. In conclusion, the way that technology has changed has required frequent discussions and changes in social standards and expectations about what behavior is acceptable and unacceptable. Our knowledge on how to deal with the risks of using technology will hopefully advance along with it.

Discussion 13

I agree with the author to an extent, technology definitely plays a role in how we view and act towards things. We have the ability to view millions of peoples insights of the world right at our fingertips which can alter how we see and think of things. Technology has drastically changed the way that we socialize to each other. Easy access to people using technology has helped transform and progress humanity, but because of its dominance and ability it almost seems as if it consumes some peoples lives. Technology has altered the privacy of people, it is normal to post about yourself and is easy to find information about people. We should be more careful when it comes to how we use technology, to much of anything isn’t good and it seems as times goes on people just continue to get more indulged into technology.