ePortfolio entry #1

I am interested in cybersecurity technology because I have never taken a cybersecurity technology class before. One of my friends is majoring in cybersecurity, so whenever they talk about their courses that are related to it, it makes me very fascinated with how IT experts develop such complex processes and think critically in order to manage cyber attacks and prevent future ones. Going into a cybersecurity course without prior knowledge can be an interesting learning experience because I get to learn how things such as firewalls are developed to protect individual’s information. I am also interested in cybersecurity technology because I want to know how hackers are able to bypass firewalls and steal information or plant viruses in an individual’s computer.
Cybersecurity technology can relate to any major, as each major requires technology to be used. Criminology relates to cybersecurity because workers in that field often use technology in order to do forensic studies- like analyzing blood and DNA in order to determine the victim. Also, there are several cyber crimes such as hacking, identity theft, and phishing that people are easily prone to. Cybersecurity technology like firewalls, antivirus programs, and encryption help prevent individuals from becoming victims by detecting malware. Accounting relates to cybersecurity technology because computers are required to use computers to help record business’s financial transactions. If a company was to fall under a cyber attack, there would be a data breach, and important financial information could get leaked. Nursing relates to cybersecurity technology because also use computers in order to record patient’s medical records and their personal information. Cybersecurity is important in nursing because a breach of patient’s data could allow for indetity theft and fraud. And finally, cybersecurity relates to internation relations and affairs because a cyber attack cause cause classified government files and documents to get leaked, which is great risk in national security if the enemy gets a hold of them. 

ePortfolio entry #2

Four ethical issues that arise when storing electronic information about individuals include privacy, security, accuracy, and access. Storing sensitive information like medical records, financial information, and others like credit card numbers and social security numbers is vital to keep safe, as such information being leaked can lead to crimes such as fraud and identity theft. Privacy is important in storing electronic information because it allows individuals to be able to only look at their personal information and reduces the risk of identity theft. Security is important- when storing personal information, it is vulnerable to cyberattacks. If there are no safeguards or security measures to protect data from breaches and hacks, it is susceptible to being stolen. This raises ethical issues because if a company or organization doesn’t have the resources to have sufficient security measures to protect their employees’ data, it can leave them susceptible to being exposed and compromise their privacy. Accuracy is another ethical issue that arises when storing electronic information because any error or inaccuracies can cause consequences. It can cause misunderstandings- for example, in the medical field, if there are inaccurate medical records about patients, it can cause the doctors to misdiagnose. It can cause legal action. In a company setting, if there’s inaccurate information about employees, it can cause their superiors to make incorrect decisions that negatively impact them and possibly false accusations. Finally, access raises an ethical issue when storing electronic information because if personal data can be accessed from anywhere, it should be to only the individuals themselves and important figures such as doctors, law enforcement, and employers. Just like how privacy is important when it comes to sensitive information, such access can allow it to be stolen and used for malicious purposes. Having control access is important to prevent data from being seen by just anyone helps protect and limit the use of their personal data. Compared to the United States which has 10.47% of SSH attacks, China has a percentage of 28.56, meaning China is more susceptible to cyber attacks than the US. 
source: https://www.comparitech.com/blog/vpn-privacy/cybersecurity-by-country/

ePortfolio entry #3

Cyber technology has created opportunities for workplace deviance because it puts companies and organizations at risk of being exploited. If the organization has a security program that is old and outdated, do not have cyber threat awareness training programs, and safety measures and guidelines to prevent a cyber attack, it would make it easy for malicious employees to steal and obtain sensitive information like social security numbers and financial information and use it for financial gain, personal objectives, or revenge. If not to steal for personal reasons, having access to sensitive information can make it easier for employees to share confidential information with others via leaking it on the Internet or telling it in person to family and friends who do not need to know such classified information. Cyber technology can also create workplace deviance because employees can engage in unacceptable activities and misuse the company’s resources. Elaborating on financial gain, having access to the company’s classified information and knowledge of it can provide an opportunity for an employee to sell the information. Employees can also use the organization’s finances to go on a shopping spree or transfer money to their bank account. Employees can also send phishing emails using the cover of the company to get their victims to link on a malicious link and gain credit card information. Workplace deviance can also happen due to cyber technology because employees would also have access to the company’s security systems. A vengeful employee or a negligent employee could leave the organization’s security system vulnerable to cyber attacks like hacking, and the company’s information can be used for identity theft, financial fraud, or exploitation of its services and facilities. Along the lines of malicious employees, cyber technology can allow deviance by cyberbullying and can extort and exploit other employees. In conclusion, cyber technology has created many opportunities for workplace deviance, from theft to financial gain to bullying- all for financial and personal gain.

ePortfolio entry #4

Firstly, the cost of cybersecurity programs is how much technology the business has to spend to upgrade its technology if its program is outdated. The company would have to hire people to install the programs and set up the equipment. Another cost is having to train employees, both timely and financially, as the business would have to hire someone to teach the employees how to use the new program and have them adapt to it, and depending on how comfortable and knowledgeable the employees are with technology, it could take a while to have everyone be adjusted to the new software. Keeping up to date with technology and updating the cybersecurity programs to the newest version is another cost. The organization would need to constantly spend money to buy new equipment and the newest program to ensure safety from cyber attacks. Another cost of developing cybersecurity programs would be having to hire employees who are well-trained in using technology, as their experience would have the business paying more to keep them working for the company. A benefit of developing cybersecurity programs is that it would reduce the risk of businesses of being susceptible to cyber-attacks and have their employees’ financial information and personal data such as social security numbers and credit card numbers, as well as its customer’s information. The business having the latest and up-to-date cybersecurity programs would help it against hacking and phishing. Another benefit of developing the security programs is simply the company having security- it allows important, sensitive information to be safely stored. There would be safeguards to protect the data from said cyber attacks. In conclusion, although upgrading and updating to the newest cybersecurity programs would be costly for businesses, it would be beneficial in the long run, as it would protect its employees’ and customers’ private information from being stolen or leaked by cyber attacks.

ePortfolio Entry 5

I can tell if my computer is safe because of how much technology has advanced. With the constantly developing technology, programs are able to keep up with the also advancing malicious cyber attacks- such as hacking, phishing, and other malicious codes. By constantly upgrading and updating my computer’s safeguard programs, it ensures that my private information and important documents are protected and safely stored. And by backing up my data using the cloud or an external drive, my computer is also safe in the case of a cyber attack. I could just reupload my data and it will be restored.

One way computers have made it the world more safe is its ability to use cryptography. Cryptography helps protect user’s information by allowing them to be able to access their personal information safely while reducing the risk of it being stolen through digital signatures and certificates. Secondly, computers have encryption, which further protects user’s data from being easily accessed by others because it hides data during storage and transmission and scrambles it, and has a unique key to unscramble the data. Thirdly, computers can use FIDO, which makes accessing information more secure because it uses second-factor authentication or a PIN to verify the user’s identity. 

Computers have also made the world less safe. One reason is that it makes it easier for workplace deviance- employees have insider access and can easily get into their company’s personal information and steal and leak it. Secondly, as I stated before, malicious methods to commit cyber attacks also develop long with technology. Computers can be used to develop malicious codes easily and more efficiently to be sent out to unsuspecting victims. And finally, computers that are old and are not able to update and upgrade  to the newest programs make the world less safe because it makes it more susceptible to cyber attacks. 

ePorfolio Entry 6

Engineers make cyber networks safer because they design software that ensures user’s safety when communicating and sending confidential information. For example, SCADA system engineers perform implementation and design programs that use station computers or information processors for communication with PACS (Programmable Automation Controller) and other protective relays. Engineers also are able to design complex software that is trustworthy and can give users confidence that their devices are protected from cyber-attacks. They also make sure cyber networks are safe by making sure that the programs are broad and holistic; it ensures that there is protection of user’s data by creating well-made systems and security measures to allow leverage over any cyber attack, adapt in the case of any attack, and supplement the software. Engineers make sure the program is able to achieve every step of the system life cycle- from concept, development, production, utilization, support, and retirement. Creating the software to be able to perform at peak capabilities, helps cyber networks be safer. Thanks to engineers, cyber networks can be designed, updated, and developed to protect individuals and their private information. But what happens when their information is stolen? The criminal justice system plays a role, hand in hand with cybersecurity. The overlap between criminal justice and cybercrime is that both crimes are done with malicious intent- whether it’s for personal gain or revenge. Both criminal justice and cybercrime also have laws implemented to punish persecutors; in criminal justice, there are written laws and punishments when it’s broken, and in cybercrime, there are also such laws that adapt to electronic-related crimes, like hacking laws that regulate unauthorized access of devices, federal malware law that made it illegal to damage and transmit viruses, and cybercrimes against both theft and harassment. This overlap relates to other disciplines discussed during this course because we’ve learned about the types of crimes, such as hacking and phishing.

ePortfolio entry 7

Cyber technology impacts interactions between offenders and victims because it allows for the perpetrators to hide safely behind anonymity and they are able to freely and constantly create new emails and social media accounts, and buy phones in order to relentlessly harass and stalk their victims. Because it’s so simple for someone to hide behind anonymity, offenses like cyberstalking and cyberharassment also impact interactions between the perpetrators and victims because it makes it easy for the offender to keep in contact with the victim. Cyberharassment is the criminal act of using messages, emails, and social media to harass, threaten, torment, or annoy another person. Cyberstalking, on the other hand, is the act of persistently pursuing a single person via the same channels of communication as cyber harassment (messages, emails, social media posts), which is typically accompanied by threats, coercion, and intimidation. The victim of either type of crime feels fear. Anyone can purchase a burner phone that doesn’t require a registered name or ongoing monitoring, making it easy for anyone to engage in cyberstalking and harassment. Cyber technology has also impacted interactions between offenders and victims because it allows deviance by cyberbullying and the offenders can extort and exploit their victims through threats, like cyber harassment. We should approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge by having an open mind, incorporating a variety of information and perspectives, and looking back on past successes and failures in order to determine what to implement in the new development. Also, when developing cyber-policies, we should prioritize cooperating with one another when workshopping the policies, as people have different views. It can help clean up and identify potential loopholes and weaknesses in the policy, ensuring it remains effective and aligned with its intended outcome for the long term.