Journal #2

Technology in Our World

In today’s day and age our world is constantly evolving. In the past years there have been technological breakthroughs that people in society were only dreaming of creating. In our society today almost every business is ran through technology because it makes everyday work that much easier. Many companies rely on technology to continue functioning, and continue to proceed in their industry. This means when a company’s network goes down or is penetrated many issues are going to arise, and the company may be at threat.

Cyber attackers are a very real threat in our society today because based on the information they receive from an attack determines how much power they have. The Cybersecurity Enhancement Act of 2014 updated the role of the National institute of Standards and technology. The NIST is an organization dedicated to improving the protection from dangerous cyber attackers. In February 2013, NIST formalized Framework Version 1.0 under Executive Order 13636. The Framework brought to light the risk of cybersecurity attackers. Many people are still taken advantage of by cyber attackers simply because they do not know the most effective way to protect themselves. In our society today there are many people who still have very little knowledge of protections against cyber threats. The Cybersecurity Enchantment Act was developed to publicly inform individuals that cyber threats do exist, and how to best defend against them. There always going to be criminals because people are always going to want what they cannot have. When an individual wants something often times they are going to take whatever means it takes get it. The Framework can compared to a local 7/11. The storeowner to protect against thieves has video cameras installed, and locks the door when the store is no longer open. The Framework is very similar to that because companies now monitor who is entering in their network, and also best keeping out individuals who are not supposed to be on their network.

Journal #1

Information Security Constrained by Societal Factors

Information security for the most part is only breeched 99% of time because of user. Most of time the systems that are in place for information security do not fail. The user being the main cause of 99% of information security breaches defines information security constrained by social factors and cultural factors.

Technology is still a fairly new concept for many individuals. There are groups of individuals that still are very intimidated by technology. Many elderly individuals are very a high risk for information security because most are very easily manipulated. Hackers know that this is the case, and make specific attacks designated for uninformed elderly individuals. There are many cases where individuals have had thousand of dollars stolen from them. This is just one of the many examples as to how information security is culturally  constrained.

In today’s day and age kids are almost born with a smart phone in their hand. One of the biggest issues for parents in the 21stcentury is how they are going manger the amount of time their children spend with electronics. Young children are so susceptible to becoming addicted to electronics. Currently, there are these two complete opposite sides of the spectrum with regards to information security. These issues have to be addressed with regards to improving the information security of the United States as whole. The programs that have been developed to protect individuals from cyber attacks have proven to be very effective. The core principle that needs to be focused on is the cultural, and societal factors that are constrained. There needs to be more education focused on informing individuals who are unaware how to best protect their information. If there was more education on information security when there is a security breach the likelihood of the breach being traced back to the user will decrease.

About Me!

Hello, I am a junior at Old Dominion University my name is Geofferson McNeese. I am a criminal justice major with a minor in cybersecurity. I am currently working for an information technology company. We are the IT team at many doctors offices, and real state companies, and a few churches in the Hampton Roads area. Through this opportunity I have had many experiences with cybersecurity, and have been able to apply some of the concepts I have learned through my classes. I am looking forward to informing more individuals about how to improve cybersecurity.