Journal Entry #3

Researchers can turn to data breach information on PrivacyRights.org to uncover valuable insights. By analyzing the types of breaches, they can identify recurring patterns or vulnerabilities. This might point them toward certain industries being more frequently targeted. From there, they can assess how well security measures or privacy laws respond to these threats. As more data accumulates, researchers can track how the landscape of breaches shifts over time. This research helps shape future strategies to protect sensitive data.

Journal entry #2

Science and cybersecurity go hand in hand. Observation, experimentation, analysis—these are the tools. Scientists find vulnerabilities by testing, probing, and gathering data. They uncover weaknesses with systematic methods. Data analysis reveals unusual patterns in network traffic. It’s about spotting threats before they strike. The scientific method drives continuous improvement in security measures. New protocols and technologies evolve from this process. Cybersecurity benefits from science’s focus on evidence and iteration. Through this lens, defenses get stronger, and responses to threats become sharper. Scientists test and retest, always seeking better ways to guard against breaches. Each experiment provides insights, leading to more robust solutions. This iterative process ensures that cybersecurity evolves with emerging threats. Collaboration across scientific and technical fields further strengthens the resilience of digital systems. By integrating insights from various disciplines, cybersecurity strategies become more comprehensive and adaptive, meeting the complex challenges of the digital age. Continued research and innovation drive the field forward, ensuring robust defenses against ever-evolving cyber threats.

Journal Entry #1

The NICE Framework outlines some interesting career options. Protection and Defense is

particularly appealing to me. The prospect of actively securing systems and stopping attacks

matches my desire for hands-on, impactful work.Design and Development also captures my

interest. The idea of creating secure systems and building strong defenses from scratch is both

challenging and fulfilling. I enjoy the blend of creativity and technical skill involved in developing

security solutions.However, Oversight and Governance doesn’t attract me as much. It deals

more with policies and compliance, which seems too distant from the technical work and

problem-solving I prefer. Similarly, Cyberspace Intelligence and Cyberspace Effects

focus on broader strategic perspectives, which are less engaging to me than the direct,

technical roles.

Entry #7

Journal Entry: Understanding How Cyber Technology Affects People and Making Smart Cyber Policies

Cyber Technology and How People Interact:

The way people interact because of cyber technology is different now, and it’s important to look at how it affects both those doing wrong things and those who become victims.

  1. Hiding Behind Screens:
    People who do bad things online can hide their real identities, making it hard for the people they hurt to figure out who they are. This makes it easier for those doing wrong to feel like they won’t get caught.
  2. Being Mean Online:
    With social media and the internet, some people use these platforms to be mean or harass others. It’s like a new way to hurt people emotionally without having to be near them.
  3. Tricking People for Money:
    Some people use cyber technology to trick others out of their money. This can happen through scams, stealing personal information, or other tricks that can make people lose money and have their private info exposed.
  4. Crimes Going Global:
    Unlike regular crimes that usually happen in one place, cybercrimes can affect people anywhere in the world. This makes it hard for the police to catch the bad guys and stop them.

Making Smart Cyber Policies:

To deal with these problems, we need to think carefully about how we make rules and systems for cyber technology.

  1. Being Ready for Changes:
    Since cyber tech is always changing, our rules and systems need to be ready to change too. We need to be able to respond quickly when new problems come up.
  2. Working Together:
    To make good rules, we need to work together with people who know about tech, laws, and how people live. This way, we can make rules that understand both the tech side and how it affects people’s lives.
  3. Keep Learning and Tell Others:
    Because things change, we all need to keep learning about how to stay safe online. Rules should encourage everyone to keep learning and share what they know with others to stay safe.
  4. Helping Other Countries:
    Since cyber problems can happen anywhere, our rules should also work with other countries. We need to work together to stop people from doing bad things online and protect everyone.

In the end, understanding how cyber tech affects people and making good rules go hand in hand. It’s about keeping up with changes, working together, learning, and making sure everyone is safe online.

Entry #6

Enhancing Cyber Network Safety:

Engineers play a big part in making cyber networks safer by doing a few key things.

  1. Locking Up Data:
    They use fancy codes to keep data safe when it moves around the network. This makes it really hard for anyone who shouldn’t see it to understand, making the whole network more secure.
  2. Watching for Trouble:
    Engineers create systems that keep an eye on the network to catch anything fishy. If something seems off, these systems can figure out what’s happening and stop it before it causes a big problem.
  3. Checking and Updating:
    They always check to find weak points in the network. It’s like looking for cracks in a wall. And, they make sure all the software and security stuff is up to date so bad guys can’t sneak in through old openings.
  4. Teaching People to be Safe:
    Engineers also teach people using the network how to be safe. They explain the dangers of things like fake emails and tricks people use to get information. This helps everyone using the network be more careful and protect it better.
  5. Building Virtual Walls:
    They set up strong walls and rules to control who can get in or out of the network. It’s like having guards at the gate to make sure only the right people come in and go out.

Overlap Between Criminal Justice and Cybercrime:

The connection between criminal justice and cybercrime is pretty clear. They work together to deal with crimes that happen in the digital world.

  1. Making Laws and Punishing Bad Guys:
    People in criminal justice make sure there are laws for cybercrimes. If someone breaks these laws, they get in trouble. This is like having rules for how people should behave online, and if they don’t follow them, they face consequences.
  2. Finding Clues in Computers:
    Criminal justice folks also use computers to find clues. It’s like being a detective, but on the internet. They use their computer skills to figure out who did something wrong and how to stop them.
  3. Working Together with Other Experts:
    They team up with experts from different fields, like computer science and tech, to fight cybercrimes. This way, everyone brings their special knowledge to the table to beat the bad guys.
  4. Making Plans to Stay Safe:
    Criminal justice people help create plans and rules to stay safe online. It’s like making a plan for everyone to follow so that the bad guys have a harder time causing problems.

In simple terms, engineers help keep the online world safe, and criminal justice folks make sure the rules are clear and catch anyone who tries to break them. They work together with other experts to stay a step ahead of the bad guys.

Entry #5

Ensuring Computer Security:

Determining the safety of one’s computer involves a comprehensive approach that includes both software and user behavior.

  1. Antivirus Software:
    Install reputable antivirus software to ensure computer safety. Regularly update the antivirus database and perform system scans to identify and eliminate potential threats, such as viruses, malware, and phishing attempts.
  2. Firewall Protection:
    Enable a firewall as a barrier between your computer and potential unauthorized access. Firewalls monitor incoming and outgoing network traffic, blocking or allowing data based on predetermined security rules. Configure and maintain an active firewall for an additional layer of defense.
  3. Regular Software Updates:
    Keep all software, including the operating system and applications, up to date for computer safety. Software updates often include security patches addressing vulnerabilities exploited by cyber threats. Enable automatic updates to apply the latest security features promptly.
  4. Secure Password Practices:
    Implement strong, unique passwords for accounts to enhance overall computer safety. Use a combination of letters, numbers, and symbols, and avoid easily guessable information to strengthen defense against unauthorized access. Employ a password manager to create and manage complex passwords for various accounts.
  5. Safe Browsing Habits:
    Practice safe browsing habits. Avoid clicking on suspicious links or downloading files from untrusted sources. Verify the legitimacy of websites before entering personal information for an extra layer of protection against phishing attacks.

Computers: Enhancing Safety and Introducing Risks:

Enhancing Safety:

  1. Improved Communication and Emergency Response:
    Computers have revolutionized communication, enabling real-time information sharing globally. This connectivity facilitates swift emergency responses in times of crisis, aiding in coordinating relief efforts and disseminating critical updates.
  2. Enhanced Healthcare and Research:
    Computers significantly advance healthcare and research, from medical diagnostics to drug discovery. Electronic health records streamline patient care, and simulations aid in understanding complex biological processes, contributing to medical advancements.
  3. Increased Surveillance for Public Safety:
    Surveillance technologies, powered by computers, contribute to public safety. From traffic monitoring for efficient urban planning to facial recognition for law enforcement, these technologies enhance overall security and contribute to crime prevention.

Introducing Risks:

  1. Cybercrime and Identity Theft:
    Computers have facilitated the rise of cybercrime, including identity theft and financial fraud. Malicious actors leverage vulnerabilities in digital systems to steal sensitive information, leading to financial losses and personal privacy breaches.
  2. Global Cyber Espionage:
    Nation-states and cybercriminals exploit computers for global cyber espionage. This involves infiltrating networks to steal sensitive information, disrupt critical infrastructure, or conduct cyber warfare. The interconnected nature of the digital world amplifies the impact of such activities.
  3. Privacy Concerns and Surveillance Abuse:
    The pervasive use of computers in surveillance raises concerns about privacy. Governments and corporations can abuse surveillance technologies, leading to unwarranted intrusions into individuals’ lives. The collection and misuse of personal data pose significant threats to privacy rights.

In navigating the digital landscape, it is essential to recognize the dual nature of computers, understanding both their potential to enhance safety and the risks they pose to personal and global security. Vigilance, education, and proactive security measures are crucial for harnessing the positive aspects of computer technology while mitigating potential risks.

Entry #4

The development of cybersecurity programs in business comes with both costs and benefits, reflecting the ongoing struggle to safeguard sensitive information in an increasingly digital world.

Costs:

  1. Financial Investment:
    Implementing robust cybersecurity measures demands a significant financial investment. Businesses need to allocate resources for state-of-the-art security technologies, regular software updates, and hiring skilled cybersecurity professionals.
  2. Training and Awareness Programs:
    Educating employees about cybersecurity best practices requires time and effort. Conducting training programs to raise awareness about potential threats and instill a culture of cybersecurity within the organization is an ongoing cost.
  3. Operational Disruptions:
    The implementation of cybersecurity measures can disrupt regular business operations. For instance, the installation of new security protocols may temporarily hinder workflow, impacting productivity.
  4. Regulatory Compliance:
    Businesses often need to adhere to various cybersecurity regulations and standards. Ensuring compliance involves additional costs, including legal and regulatory consultation fees to stay abreast of evolving requirements.

Benefits:

  1. Protection Against Cyber Threats:
    The primary benefit of cybersecurity programs is the enhanced protection against cyber threats. Investing in robust security measures reduces the risk of data breaches, ransomware attacks, and other malicious activities that could compromise sensitive information.
  2. Preservation of Reputation:
    A strong cybersecurity stance contributes to maintaining the company’s reputation. Customers and clients are more likely to trust businesses that prioritize the protection of their data, enhancing brand integrity.
  3. Mitigation of Financial Losses:
    While implementing cybersecurity measures incurs costs, the potential financial losses resulting from a successful cyber attack far exceed these initial investments. Cybersecurity programs act as a preventive measure, mitigating the impact of data breaches and associated financial repercussions.
  4. Competitive Advantage:
    Demonstrating a commitment to cybersecurity can provide a competitive advantage. Clients and partners increasingly prioritize working with businesses that prioritize the security of shared information, creating a differentiator in the market.

In conclusion, the costs and benefits of developing cybersecurity programs in business are intertwined. While the financial investments and operational adjustments may seem burdensome, the long-term advantages in terms of protection, reputation, financial resilience, and market competitiveness make cybersecurity programs a crucial aspect of modern business strategies.

Entry #3

The rise of cyber technology has undeniably brought forth new opportunities within the workplace, but it has also created openings for potential deviance. Examining this dual aspect requires recognizing the ways in which cyber technology facilitates opportunities for workplace deviance.

One significant avenue is the misuse of company resources enabled by digital tools. As technology becomes more integrated into daily work operations, employees might exploit these resources for personal gain or non-work-related activities. Whether it’s excessive personal internet usage, unauthorized software downloads, or using company equipment for personal projects, cyber technology provides the means for such deviant behaviors.

Moreover, the prevalence of digital communication platforms has transformed how colleagues interact. While these platforms enhance collaboration, they can also become channels for deviant behavior, such as cyberbullying or spreading misinformation within the workplace. The relative anonymity offered by digital communication may embolden individuals to engage in behaviors they might avoid in face-to-face interactions.

Additionally, the rise of remote work, accelerated by cyber technology, introduces new challenges. The blurred lines between personal and professional spaces in remote settings may tempt employees to engage in deviant behaviors, such as misrepresenting their working hours or using work time for personal tasks. Managing security over a variety of networks, especially home networks, poses a multitude of risks.

Cyber technology also plays a role in intellectual property theft and data breaches. Employees, either out of malevolence or ignorance, may compromise sensitive company information, leading to potential financial and seriously damage ones reputation.

To mitigate these risks, organizations must implement robust cybersecurity policies, offer comprehensive training on ethical behavior in the digital workplace, and foster a culture of transparency and accountability. It is crucial for employees to recognize the ethical implications of their actions in the digital realm, and for organizations to stay vigilant in adapting policies to the evolving landscape of cyber technology.

Entry #2

Ethical Considerations in Electronic Information Storage:

The storage of electronic information about individuals introduces ethical concerns, reflecting the complex interplay between technological progress and the preservation of individual rights.

  1. Privacy Intrusion:
    Collecting and storing personal data, particularly without clear disclosure or consent, raises concerns about privacy invasion. Individuals may perceive this as an unwarranted exposure, especially when the gathered information extends beyond what is necessary for its intended use.
  2. Security and Data Breaches:
    Safeguarding electronic information ethically requires a profound commitment. Instances of data breaches resulting from inadequate cybersecurity measures violate the trust individuals place in organizations. Ethical quandaries arise when robust security measures are not implemented, potentially leading to severe consequences like identity theft or financial loss.
  3. Surveillance and Consent:
    In an era dominated by surveillance technologies, ethical issues arise concerning the absence of informed consent. Individuals might unknowingly become subjects of monitoring, challenging principles of autonomy and the right to be free from unwarranted surveillance.
  4. Data Accuracy and Discrimination:
    Ethical considerations extend to the accuracy of data. Inaccurate or outdated information can lead to unjust outcomes, including denial of opportunities or services. Discrimination becomes a concern when decisions are based on flawed data, perpetuating biases and undermining fairness and equal treatment principles.

Comparison of Cybersecurity Risks: U.S. vs. Another Country:

Contrasting cybersecurity risks between the U.S. and another country provides insights into global cyber landscapes.

In the U.S., a technologically advanced nation with extensive interconnectivity, risks stem from sophisticated cyber threats. The nation faces continuous challenges in securing critical systems and sensitive data, particularly in critical sectors like finance and healthcare.

In contrast, in a developing country, cybersecurity risks may center around infrastructure limitations and resource constraints. These nations may grapple with fundamental cybersecurity practices, making them susceptible to common threats like phishing and ransomware. International cooperation and capacity-building are vital aspects of their cybersecurity strategy.

In conclusion, ethical reflections in electronic information storage demand a delicate equilibrium between technological strides and individual rights. Globally, the cybersecurity landscape varies, with developed nations contending with intricate threats and developing nations navigating challenges rooted in foundational cybersecurity practices and resource limitations.

Entry #1

My interest in cybersecurity technology stems from its critical role in safeguarding digital landscapes against evolving threats. The dynamic nature of this field captivates my curiosity, driven by the constant need for innovation to counteract sophisticated cyber threats. Furthermore, I would like to make way into deterring online sex trafficking, and cybersecurity plays a crucial role in that.

When exploring other majors at Old Dominion University (ODU), I’ve discovered a rich tapestry of interdisciplinary connections with cybersecurity:

  1. Computer Science:
    Computer Science at ODU provides the foundational knowledge essential for cybersecurity. Understanding algorithms, programming languages, and software development enhances one’s ability to design secure systems and develop robust cybersecurity solutions.
  2. Information Technology:
    This major complements cybersecurity by focusing on the practical application of technology. Information Technology majors can delve into network security, system administration, and digital forensics, bridging the gap between technology and cybersecurity implementation.
  3. Criminal Justice:
    In the realm of cybersecurity, Criminal Justice majors play a crucial role in understanding cybercrime, digital forensics, and legal implications. Their expertise contributes to the ethical and legal dimensions of cybersecurity policy and enforcement.
  4. Business Analytics:
    With the increasing integration of technology in business operations, majors like Business Analytics become integral to cybersecurity. Analyzing data patterns and identifying anomalies aids in proactive threat detection and risk management within a business context.
  5. Engineering Management:
    Engineers versed in management principles can play a pivotal role in coordinating multidisciplinary teams working on cybersecurity projects. Their ability to understand both the technical and managerial aspects enhances the overall effectiveness of cybersecurity initiatives.

In summary, my interest in cybersecurity technology is woven into the broader fabric of ODU’s diverse majors. The interdisciplinary nature of these majors reinforces the interconnectedness of cybersecurity with computer science, information technology, criminal justice, business analytics, and engineering management. This intersectionality enhances my understanding of cybersecurity’s holistic impact on technology, society, and business.