Journal Entry

Week 1

  1. How does your major relate to cybersecurity technology?
    1. As Cybersecurity Major I believe that the entire premise of my education would be steeped in cybersecurity technologies. As I am fairly new to the whole idea, I am not really sure what to expect but look forward the new world I am going to discover over the course of my studies.
  2. Select four other majors offered by ODU and explain how those majors relate to cybersecurity.
    1. I originally was an Information Technologies major; cybersecurity is primary function with in the IT world.
    1. AS a business Major one could also assume that there is an inherent requirement for Cybersecurity. Especially in the sense of ensure your customers PII.
    1. Pick any of the sciences and the same theory applies.
    1. As in the sciences any of the visual arts can attribute a rudimentary need for foundations laid in cybersecurity.

Week 2

1. Describe four ethical issues that arise when storing electronic information about individuals.

The problems that can result from unauthorized access to PII are generally well-recognized. They include embarrassment or other emotional distress from the unauthorized release of information, economic loss from identity theft, or physical or psychological harm from “Stalking.” Problems from authorized processing may be less visible or not as well understood, but they also result in real consequences.  – Privacy Engineering and Risk Management

2. Compare cybersecurity risks in the U.S. and another country

Based off of the Global security Index (2017) the US received a GCI score of .91 we are considered one of the highest scoring countries in our region and in the top countries of the world, success can be directly attributed to the National Governor’s Association and the established Resource Center for State Cybersecurity, which offers best practices, tools and guidelines.

WEEK 3

How has cyber technology created opportunities for workplace deviance?

There are certain online behaviors that can easily be utilized for deviant things. These may not necessarily be illegal but perhaps against company or workplace policies. Things such as using work email for personal communications, opening spam, or on-line shopping while at work. These are just a snap shot of the behaviors that can be attributed.

Week 4

What are the costs and benefits of developing cybersecurity programs in business? There are multiple reasons why a solid cybersecurity program would or could be cost beneficial to a company or organization. The first reason that comes to mind is securing customers purchase and payment information. With out a solid way to protect this vital information not only are putting your company’s ability to operate and purchase materials but you are alienating your clients. Secondly and this is vitally equal in my opinion if you are not safeguarding your procedures and data (which could be trade secrets or procedural items) the loss of said information could lead to a halt in production for a variety of reasons. That pause in production means lost revenue, missing deadlines and multiple other things that would continue to lose revenue.

How can you tell if your computer is safe? I would assume that there are signs and symptoms that would be noticeable if your system was compromised. Such as random pop-ups, lack of storage space, slow operating system. These things in my opinion could easily be rectified by a solid anti-virus software and the use of VPN. However, the only way to truly know that a computer is safe would-be total isolation, i.e. a computer that is cut off from the rest of the world.

Week 5

  1. Describe three ways that computers have made the world safer and less safe.

Here are some out of the box safety examples;

  1. The use of computer models to develop safety systems in transportation i.e. development of deployable airbags or using computers to analyze crash data.
  2. The use of computer systems in avionics. Not only to fly the plane but also in navigation.
  3. Lastly but not least the use of computer systems in security. The utilization of face recognition software and networking data bases to help the police catch criminals.

The criminal aspects of computers are all together beyond most average citizens to comprehend. Sure, there is the standard steal someone’s identity and therefore gain access to an individual’s money but let’s look at a couple of more nefarious instances; The ability to hack into vital infrastructure as in the colonial pipeline. That had catastrophic secondary and tertiary effects. Effects that impact millions of people! Not to mention the ability to use the internet for untraceable human trafficking.

2. How do engineers make cyber networks safer?

Engineers have a multitude of ways that they can improve and make networks safer. For example, the implementation of updated software as well as hardware. Increasing encryption keys as well as ensuring up to date firewalls are just a couple of things off the top of my head.  

Week 6

1. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

So, I must admit I am at loss here… I am not sure as to whether or not I truly understand the question. After quick search through the course material, it brought me back to the paper written in 1972 by Hans Jonas and that was a struggle to read through the first time! But here’s my shot in the dark…

If we look at the legislation of cyber harassment and cyber stalking from the article written by Hazelwood & Koon-Magnin, we can clearly see that we are lacking the ability to keep up with the ever-changing cyber world. In other words, our ability to emplace proactive policies is severely limited by our inability to keep up with the technology. And man is man, meaning that humans have the drive to inflict pain in order to self-satisfy. Or in other words we have the capacity to navigate technological advancements and utilize the “newness” to one’s advantage regardless of how it affects others.

2. How does cyber technology impact interactions between offenders and victims?

Let’s look again to the article by Hazelwood & Koon-Magnin I refer particularly to the case of Melissa Anellin versus Jessica Parker. In this particular case the perpetrator of the cyber harassment and stalking was half a world away in New Zeeland. Parker was able to affect the way Anellin behaved and therefore in a profound way without ever having close proximity. This and other case’s like have shown that there is an inherent danger and deep connection in these specific cases. Ultimately it also provides a layer of anonymity to offenders that can give the offender a sense of invulnerability that in my opinion can make offenders even more dangerous.