I am interested in cybersecurity technology because I like the overall concept of technology. I like being on my phone, playing the game, and using computers while learning new things on them every day. Growing up as a kid I loved using technology. I have always been a problem-solving guy. A guy who wants to solve every problem I face and for others also. So, knowing I would get to solve real world problems now is amazing. The technology field provides numerous career opportunities and is often associated with high paying jobs and job security. I am highly interested in this field because it offers a path to success and a fulfilling career. I would be fascinated with the newest technology devices and gadgets. I wanted to get into coding and helping out when computers have attacks. I always seen cybersecurity as a great career because every year technology advances, so you’re always going to be into something new and they will always need workers. I am an extrovert, so I always thought being in the cybersecurity field would connect me to other individuals and put me out there. I feel like it would give me more connection in the technology industry with people that are more knowledgeable and experienced. Technology has a big impact on society, so knowing that the job will be long lasting and seeing new things very often. Since technology is going to get more advanced over the years, I felt it would be great getting into it knowing I would be more into it and advanced over the years. I’m also curious, so I can’t wait to see what I’m going to be getting into over the years. Technology is really diverse, so I know I wouldn’t be only learning about cybersecurity or get bored in this field because there are so many new things I can learn going into this field.
Journal Entry 2
ODU offers four majors that pertain to cybersecurity: cyber operations, computer science, criminal justice, and information technology. Each discipline explores the impact of technology on human beings, their utilization of it as a tool to achieve goals, and the subsequent progress that enhances the overall standard of living. However, each major exhibits distinct characteristics in terms of the human-cyber relationship. Computer science is a field that focuses on the study and practical use of computers. It involves the application of mathematics, engineering, functions, and theories to develop algorithms and advanced artificial intelligence or software. Computer Science enables individuals to develop highly efficient devices and programs that address and improve several aspects of our daily existence. Cyber operations, although closely related to the fundamental aspects of cybersecurity, distinguishes itself through its implementation. Cybersecurity covers different aspects of safeguarding data and ensuring online security. Nevertheless, Cyber operations use a more aggressive strategy. Cyber operations students will acquire knowledge in both offensive and defensive strategies in the field of cybersecurity, including the ability to identify and neutralize perpetrators and disrupt their activities. The cyberwar front lines are particularly valuable in domains like the military and large enterprises. Information Technology, in contrast to computer science, primarily emphasizes the interaction between humans and technology. It focuses on the examination and application of computers and various forms of telecommunications, specifically concerning the retrieval and storage of data. As an IT specialist, one must possess a comprehensive understanding of the fundamental operations of computers and other electronic devices and assure their optimal functionality for end-users. Prior to the emergence of contemporary technologies, the criminal justice system mostly concentrated on the conventional aspects of crime. With the widespread availability of computers, the commission of certain crimes has grown more convenient and can occur at any location and time. The legal system must acknowledge and formulate procedures to prosecute and enforce laws to penalize individuals involved in cyber technology.
Journal Entry 3
An initial concern that may arise is to the matters of privacy and confidentiality. The value of personal information is significant, and a major concern revolves around its security and its unauthorized sale. The second ethical worry that can develop is the subject of security breaches, which have been increasingly prevalent in recent years. Given the presence of malicious individuals in society, security breaches will invariably be a persistent concern. This covers a wide range of activities, ranging from intercepting emails via various harmful software to directly stealing a computer and manually extracting the information. The third ethical concern pertains to system implementation, which refers to the manner in which information systems should be constructed. System implementations include the configuration of a network and the arrangement of equipment in an office, with the aim of mitigating potential network problems. This is not just an ethical dilemma specific to the field of information technology, but a universal concern that embraces the human element. You must have faith in the notion that individuals are not surreptitiously observing your actions while you input your passwords. There is a significant danger that a person within the office may attempt to transmit a harmful communication that might potentially compromise the confidentiality of coworkers’ information or data. The ultimate ethical concern is to data inaccuracies, which also contains a human ethical dimension. Relying on someone else to provide correct information about oneself or others assumes a certain amount of trust. One may presume that they would input something that appears accurate, but it could be incorrect since they may have illegally obtained the information for their own benefit. There are a good number of ethical issues about individuals. Overall, these are allowing businesses to keep information about an individual. They really cause a lot of issues though.
Journal Entry 4
Government intervention, which is significantly more widespread than in Western countries. Regulators will possess the ability to obtain exclusive information that may provide advantages to Chinese companies while disadvantaging foreign enterprises. The U.S. Office of the Director of National Intelligence 2021 Annual danger Assessment highlights the presence of cyber-espionage danger, significant cyber-attack capabilities, and an increasing influence threat from China. The security audits are invasive and involve submitting IP and source code for security evaluations. Compliance costs are incurred for redesigning products to meet the requirements of the Chinese market. Additionally, there is concern that Beijing may utilize cyber standards as a means of imposing punitive measures on American companies in the event of a trade war between the United States and China. A newly developed ransomware platform has been launched, which serves as a centralized website providing comprehensive information on ransomware alerts, reports, and resources from reputable sources such as CISA, the FBI, and other federal partners. An examination of ransomware and strategies for safeguarding your organization. Defending Against Malicious Code – an explanation of viruses, worms, and Trojan horses, along with strategies for safeguarding your business against these forms of malicious code. An analysis of the menace posed by destructive software, including its potential methods of dissemination, and recommendations for safeguarding your organization. A summary of malware, its potential harm to your organization, methods for detecting it, and advice for safeguarding your business from spyware. Comprehending Denial-of-Service Attacks – an explanation of the peril posed by denial-of-service attacks and strategies for safeguarding your corporation. Phishing is a deceptive practice aimed at obtaining sensitive information. This includes an overview of phishing and provides strategies to safeguard your business against phishing attacks. Tips for safeguarding your firm from fraudulent business email impersonators. Securing Network Infrastructure Devices – an overview of the risks posed to network infrastructure devices and strategies for safeguarding them. Website Security: An examination of the various hazards posed by website attacks and recommendations for safeguarding your organization. Wireless Network Security – an overview of the vulnerabilities that can compromise your wireless network and strategies to safeguard against them. Cybersecurity Risks for Mobile Devices – dangers to cell phones and personal data assistants, along with strategies to safeguard them.
Journal Entry 5
Create a business model with protocols. Set up a plan for success in all areas of your business.
You should train you employees on all possible situation and have Manuals on hand.
Booking (logging how your money is coming in). It is important to have documents for the money you earned.
Ensure you have Uninterruptible power supply. You want to minimize the risk of loss money due to outages.
Research the demand for your product. Make sure the product you offer will be profitable to the consumers.
Surveillance, and security use cameras, a well-lit location, protect the network of your business.
Email filters. To prevent phishing. Don’t allow a hacker to pose as your lender to perform a malicious attack.
Community Outreach. Support your local community by helping owners in businesses with your product.
Use a Virtual private network. In protecting your network, you can focus on the financial input.
Recommendations. Talk with local businesses owners to learn their best practices and lessons learned.
Identify future financial setbacks. Understand how to financially grow your company.
Technology to take payments securely, use of social media to promote your business.
You should familiarize yourself with the knowledge of how hackers can affect your financial status.
Journal Entry 6
Deviance is the act or condition of deviating from customary or recognized norms, particularly in the domain of social or sexual conduct. Due to technological advancements, abnormal behavior can now occur remotely. Social media networks like Instagram, Facebook, and Twitter enable employees and employers to utilize their personal devices during work hours, leading to a kind of workplace deviance or distraction. Instances of significant workplace deviances may include an employee being deprived of a bonus or salary increase, prompting them to resort to internet platforms to express their disapproval towards their employer or the organization they are employed by. Alternatively, they could opt to engage in cyber-attacks online in an attempt to disrupt their own company’s operations. Alternatively, this scenario could involve an employee secretly acquiring the company’s confidential information and attempting to sell it to competing firms or internet platforms. Despite businesses’ careful efforts to address the danger of cyber-deviances, it appears that cyber-deviance may persist as a significant challenge for companies, particularly due to the constant advancements in technology. It is crucial for firms to incorporate deviance training into their business operations. This will enable them to gain insights from past mistakes made by employees and effectively prevent potential future issues in the workplace. Ultimately, cyber technology has significantly expanded the avenues for workplace deviancy, rendering it more convenient to engage in such behavior while also increasing the difficulty of detection, particularly due to the presence of internet anonymity. Workplace deviance is an inevitable occurrence across all professions, but the advent of cyber technology has significantly facilitated its execution. It is crucial to educate and identify these deviations in advance to proactively mitigate significant harm, not only to the organization but also to the individuals who may perceive them as viable options. Employees now find it simpler to participate in antisocial behavior without being noticed thanks to the growth of digital communication and growing use of technology in the office.
Journal Entry 7
Establishing a strong cyber security system is of utmost significance for businesses. They have the ability to safeguard corporate data from both cybercriminals and human vulnerability. However, establishing cyber security programs might involve significant expenses. One expense would be the initial setup, which entails contracting a cyber security firm to apply their system on your computer network. In order to enhance their protection, the organization should conduct thorough study to choose the most suitable cyber security program and identify their areas of most vulnerability. An additional expense would arise from the necessity of providing training to your personnel regarding the new system. Hiring an external instructor may have a financial expense, but the main investment required is time for teaching. The personnel would require a few weeks to familiarize themselves with the system and guarantee they are not exposing themselves to the risk of a cyber-attack. The third expense would pertain to maintenance and ongoing care. Maintenance is crucial as organizations must consistently upgrade their software to keep up with the latest releases. By ensuring that your system is up to date, you will optimize its performance and enhance its ability to defend against cyber assaults. Implementing a cyber security system offers the advantage of safeguarding your firm from unauthorized access by hackers. For instance, if your company is Apple, hackers may attempt to breach your system with the intention of stealing the design for the upcoming iPhone and subsequently selling it to your competitor. An implementation of a cyber security program would effectively minimize this issue and ensure the confidentiality of your personal information. Another convincing argument for the importance of cyber security procedures is their ability to safeguard personnel from personal attacks. In the event of a security breach, your employees’ and your personal information, including names, addresses, and phone numbers, may be exposed. In general, implementing and maintaining cyber security measures can be expensive, but they are certainly a worthwhile investment in the long term.
Journal Entry 8
Maintain the currency of your antivirus software. During the initial stages of computer viruses, antivirus applications mostly conducted file scans to identify signature patterns associated with recognized threats. Utilize the most superior security software available. Perform a thorough assessment of the effectiveness and reliability of your antivirus software. Seek assistance from professionals. Authenticate your VPN. Evaluate your configurations by utilizing Microsoft Baseline Security Analyzer. Ensure that you update the plugins in your browser. Evaluate the effectiveness of your firewall. Remove files permanently. Review and adjust your Facebook preferences. To ensure that your Windows operating system, Microsoft Office, and other Microsoft apps are always current, enable automatic updates in Windows Update and regularly install the latest software versions. To conduct an anti-malware scan, simply navigate to the “Virus & threat protection” section of Windows Security and select “Quick Scan”. It is crucial to acknowledge that no computer system is entirely immune to security breaches. Nonetheless, following to these procedures might reduce the likelihood of cyber assaults. Computer security is an imperative and continuous procedure aimed at safeguarding vital personal, professional, and other types of data that are crucial for daily activities. Determining the security of your computer entails being cognizant of any backdoor vulnerabilities that hackers could use to get unauthorized access to a user’s account. Users must exercise constant caution when browsing websites, downloading files, and opening emails from unfamiliar sources. In order to prevent phishing scams, users should possess knowledge of phishing strategies, such as staying informed about recent scams through news sources. Additionally, IT staff should undergo ongoing cybersecurity training to enhance their ability to safeguard their enterprises against these emerging frauds. Users must take utmost care to avoid the disclosure of confidential information, whether through social media or other electronic communication methods, as this can provide hackers with the necessary means to get access to computers.
Journal Entry 9
Computers have become an integral component of our daily lives in modern society. The impact of technology on several aspects of life in the 21st century is extensive, covering areas such as transportation efficiency and safety, availability of food and healthcare, social interaction, and productivity. Computers offer numerous advantages and have greatly contributed to improving our environment. However, computers are not without their drawbacks, and they come with certain downsides as well. The advent of computers and technology has significantly enhanced our modes of communication. The progress of our technology has resulted in the emergence of various new modes of electronic communication, such as social networking, voicemails, emails, and video conferences. This has facilitated the efficiency of information distribution. Furthermore, it is advantageous for our personal connections, educational projects, and commercial enterprises. Effective communication plays a significant role. They facilitate communication, particularly for individuals with family members deployed abroad. Effective communication is essential for maintaining healthy relationships. Communication also has drawbacks. Individuals can become oblivious to the presence of those who are physically present in their area. Additionally, excessive engagement in social networking might result in a decreased ability to interact effectively with those in their immediate nearby areas, thereby compromising their social skills. Computers have had a comprehensive impact on our education system. The internet has broadened our ability to retrieve information. Online books, photos, audio, and videos are accessible to us. Given the huge wealth of information accessible on the internet, individuals have the opportunity to fully utilize it and immerse themselves in knowledge. In addition, individuals who are unable to physically attend classes at a college campus can make use of online courses to acquire the necessary education, such as myself. Computers have facilitated global access to diverse cultural and religious education. Although the ability to access everything online provides us with an exceptional level of convenience, it has also exposed us to potential vulnerabilities. Each action we do on the internet is carefully documented, and we inevitably leave behind digital traces at every website we visit. Cybercriminals are well aware of this vulnerability and make serious efforts to exploit it for financial benefits. Undoubtedly, technology has provided us with the means to safeguard ourselves and guarantee our safety as our lives increasingly shift to the digital world.
Journal Entry 10
Security engineers are experts who safeguard computer and networking systems from prospective hackers and cyber-attacks. The complexity of security vulnerabilities in technology has increased, leading to a high demand for professionals in the field of information security. A profession such as that of a security engineer involves assisting firms in safeguarding confidential information. Data may encompass sensitive information belonging to clients, such as patient data inside a medical facility, financial records, and even personal details that are susceptible to theft by malicious hackers. Security engineers are crucial in protecting corporations, government entities, and individuals from hackers and cyber-criminals who continuously devise new methods to breach vulnerable databases. Engineers design and develop cyber networks, and they constantly seek to enhance their performance. The establishment of novel cyber networks is of utmost significance as it increases the level of difficulty for hackers to break into a system if they lack familiarity with it. Engineers will consistently enhance the cyber networks by addressing any vulnerabilities they identify. This will enhance the overall security of the network, enabling unrestricted usage without the risk of unauthorized access. An additional valuable resource for engineers would be to monitor and record all instances of cyber attacks on the internet. Engineers must regularly install new firewalls and detection systems on each device that stores sensitive data. In addition, they must do precise testing, analysis, and security evaluations. Engineers must conduct thorough investigations of both recent and historical intrusions, seizing the chance to gain knowledge and insights from these incidents. In order to ensure adequate security, it is necessary for them to assess any new technological component. In general, engineers enhance the security of cyber networks by developing novel and improved systems, thereby impeding unauthorized users from gaining access to and modifying these networks. Engineers constantly endeavor to enhance cyber networks due to the escalating importance of cybersecurity on a daily basis. With the increasing ease of computer access, cyber-attacks have emerged as one of the dominant criminal activities in modern society. Given the increasing prevalence of cybercrime, the importance of cybersecurity is growing significantly. Engineers must persist in developing secure and dependable networks to safeguard individuals.
Journal Entry 11
The increasing use of technology and the extensive dependence on computers for daily tasks and communication have not only transformed the global economy and fostered innovation, but have also provided a new avenue for criminal activities. Traditionally, a crime is defined as any criminal conduct, while cybercrime involves the use of technology as a means to carry out illegal activities. The motives and psychology of cyber criminals are particularly evident in the field of criminal justice, where the role of technology is pervasive and influential. The field of criminal justice provides comprehensive definitions and viewpoints on cybercrime, encompassing the ethical aspects of gathering information, activities that may be considered harmful or deviant, and workplace behaviors that could potentially attract cyber threats, such as employees using email or accessing prohibited websites on company computers. Cybercrime is often categorized using various terms in addition to traditional crimes. It can be classified as a white-collar crime, encompassing activities such as embezzlement and money laundering. Furthermore, it can be viewed as an international crime, as there are no geographical boundaries for offenders who can be traced across different countries. Additionally, cybercrime can be seen as a socially constructed concept, shaped by society’s understanding and definition of what constitutes cybercrime. The intersection of criminal justice and cybercrime encompasses various aspects, including information technology, cryptography, computer systems, and workplace practices related to cybersecurity. Human psychology and behavioral pathology in offenders require repellent, since cybercriminals would use hacking techniques to get unauthorized access to valuable assets if not for the existence of current encryption. Cybercrime information technology pertains to the utilization of digital data and collection methods in criminal case processes. The focus is also on determining whether criminal activity has occurred and how valuable data is maintained and safeguarded against possible perpetrators. Engaging in passive or intentional disregard for computer systems and security can be considered criminal conduct, especially when it results in significant financial losses up to millions of dollars. Insider threats pose a substantial risk to enterprises, as they involve individuals who have both the intention and the necessary access to carry out criminal activities, often more frequently than external threats. An analysis of the relationship between criminal justice and cybercrime entails studying human conduct and the utilization of technology, as well as the intention and repercussions of illicit activities.
Journal Entry 12
The technological developments of the 20th and 21st centuries witnessed profound transformations in the way technology has revolutionized interpersonal communication and connectivity. Prior until now, being well-acquainted with an individual entailed having knowledge of their residence, being aware of their landline telephone number, and engaging in a personal encounter. Salespeople depended on their great communication, appeal, and persuasion abilities to persuade others to purchase their items. The majority of bullying incidents took place within the confines of the school premises and may or may not have been resolved after students departed from school. Previously, it was straightforward to identify or visually identify potential criminals. Modern technology has provided wrongdoers with the ability to remain anonymous, which poses a challenge for victims in determining the genuineness of online communication. Fraud and scams are the most prevalent online violations. Insufficient investigation into the authenticity of an internet-based enterprise often leads several individuals to easily fall to various strategies employed by these purported “businesses” to collect their funds. These strategies include non-delivery of products to customers, provision of inferior quality things, and outright theft of their credit card information for illegal reasons. Despite the presence of fraud alerts issued by banks and criminal reports filed against these fraudulent enterprises, apprehending and prosecuting offenders for their illegal activities before they target new victims using comparable unlawful methods remains challenging. Online scammers and phishers convincingly impersonate genuine businesses and organizations, causing many victims to overlook the authenticity of their requests. It greatly benefits them when their victims are experiencing financial insecurities or seeking fast ways to acquire money without any cost. In addition to providing anonymity, cyber technology enables individuals to conceal their intentions and identities from their victims. In addition, the accessibility of immediate communication and the capacity to acquire information from open-source platforms on social media have empowered offenders to selectively target their victims. Cyberstalking and cyber-harassment are distinct from traditional forms of harassment because they take place through computers and other digital devices, which are widely owned by the majority of people in developed countries. Additionally, almost everyone with computer access has left a digital record of their online activities. Victims possess a broader range of methods to inflict psychological and emotional harm onto their victims in work, public, and school environments, as compared to direct interpersonal interactions.
Journal Entry 13
The term “short arm” in the context of predictive knowledge refers to the limited ability to anticipate the future repercussions of present actions. We lack foresight into future events, and the cyber-policies and cyber-infrastructure we establish at present will yield unpredictable consequences in the future. To achieve favorable outcomes, our approach should involve utilizing the already existing information to forecast its application for optimal advancement. Jonas asserts that the limited capacity of human power does not necessitate an extensive scope of predictive knowledge; the briefness of one is equally innocent as the shortness of the other. In my interpretation, this phrase suggests that humans cannot attribute outcomes to predictive knowledge since it is simply a forecast and the future remains uncertain. As a society, it is imperative that we utilize the available information and make optimal judgments based on this factual data. We should align the development of cyber-policy and cyber-infrastructure with the current trends of modern cyber utilization and make necessary adaptations as we progress. It is impossible to create cyber-policy decisions that are completely resistant to future changes. However, we can adopt an ethical standpoint and establish a comprehensive framework for implementing future policies, despite our lack of knowledge about the future applications of technology. The cyber-infrastructure operates similarly, as illustrated by the case of IP addresses. Initially, it was believed that IPv4 would provide a sufficient amount of address space for an entire lifetime. That assertion was swiftly disproven, necessitating the implementation of IPv6 to accommodate the increasing technological demands of the modern world. The extent to which cyber technology would be utilized was unexpected. With the ongoing advancement of technology and increasing internet accessibility, it is crucial to adapt cyber-policy and cyber-infrastructure to keep up with the current rate of growth. Technological booms can potentially impact these developments.