Journal Entry 1
How does your major relate to cybersecurity technology?
Cybersecurity technology simply involves technology that helps assist with cyber attacks. This precaution is a set of tools, different technologies, and a lot of training, designed to protect various programs, devices and data from hackers. In this society, its become very hard to go through life without the use of technology. We store our lives on our computers, phones, etc. Various businesses, offices use technology to store their financial plans and other important documents.
To start of my major is criminal justice. There are many department within my major that relate to cybersecurity. There are departments such as homeland security, IT, and many more that require special cybersecurity technology. When it comes to the department of homeland security, that is a top security department that many people want to hack. Hackers are very intelligent people,
they hack into systems to gather important information like peoples bank account information, also they try to hack important government documents. Within the government, they have special protection barriers in their buildings and even on the computers. The employees who use the computer have to go through special protocols when they are in use to protect government information. My major relates to cybersecurity technology based on the high end protection in different departments for security purposes. As the modules went on I discovered that criminal justice had something in common with the NSIT Framework strategy. The NIST came up with 5 core activities of framework which consisted of: recover, identify, protect, detect, and respond. First we look at identify, this involves using risk assessments and risk management strategy. This means each organization has their own set of strategy’s that help their employees be aware of the the types of cyber attacks, and how to deal with them. Also, they use identification, evaluations, and prioritize, to minimize the chances of cyber attacks. Protect is more of the simpler protocols. This includes awareness and training, protective technology, and data security. In other words they are training employers to be able to identify cyber attacks. They also have the use of protective technology as another way to minimize the cyber hackers to get into important data and information. Detect involves detection processes, continuous security process. It doesnt get any simpler than that. They use monitoring to simply detect when hackers are attempting to hack into a system. As far as the detection process, they have a certain way on detecting attacks, and their own way of handling it. Next on the list is responding. This includes response planning, analysis, and improvements. In this category, an organization will look to always improve their cyber security software by constantly upgrading computers, software and protection protocols. The response planning require employees to follow a specific set of rules to follow in the case of a cyber attacks. Last but not least, we get to recover. Includes improvements, communications and recovery planning. This means that each organization uses communications to detects cyber hackers or data breaches. Of course software’s will always have to have improvements to make sure the data is up to date for the highest amount of security for devices and software’s.
How does your major relate to cybersecurity technology?
Cybersecurity technology simply involves technology that helps assist with cyber attacks. This precaution is a set of tools, different technologies, and a lot of training, designed to protect various programs, devices and data from hackers. In this society, its become very hard to go through life without the use of technology. We store our lives on our computers, phones, etc. Various businesses, offices use technology to store their financial plans and other important documents.
To start of my major is criminal justice. There are many department within my major that relate to cybersecurity. There are departments such as homeland security, IT, and many more that require special cybersecurity technology. When it comes to the department of homeland security, that is a top security department that many people want to hack. Hackers are very intelligent people,
they hack into systems to gather important information like peoples bank account information, also they try to hack important government documents. Within the government, they have special protection barriers in their buildings and even on the computers. The employees who use the computer have to go through special protocols when they are in use to protect government information. My major relates to cybersecurity technology based on the high end protection in different departments for security purposes. As the modules went on I discovered that criminal justice had something in common with the NSIT Framework strategy. The NIST came up with 5 core activities of framework which consisted of: recover, identify, protect, detect, and respond. First we look at identify, this involves using risk assessments and risk management strategy. This means each organization has their own set of strategy’s that help their employees be aware of the the types of cyber attacks, and how to deal with them. Also, they use identification, evaluations, and prioritize, to minimize the chances of cyber attacks. Protect is more of the simpler protocols. This includes awareness and training, protective technology, and data security. In other words they are training employers to be able to identify cyber attacks. They also have the use of protective technology as another way to minimize the cyber hackers to get into important data and information. Detect involves detection processes, continuous security process. It doesnt get any simpler than that. They use monitoring to simply detect when hackers are attempting to hack into a system. As far as the detection process, they have a certain way on detecting attacks, and their own way of handling it. Next on the list is responding. This includes response planning, analysis, and improvements. In this category, an organization will look to always improve their cyber security software by constantly upgrading computers, software and protection protocols. The response planning require employees to follow a specific set of rules to follow in the case of a cyber attacks. Last but not least, we get to recover. Includes improvements, communications and recovery planning. This means that each organization uses communications to detects cyber hackers or data breaches. Of course software’s will always have to have improvements to make sure the data is up to date for the highest amount of security for devices and software’s.
JOURNAL ENTRY 2
Select four other majors offered by ODU and explain how those majors relate to cybersecurity
There are many majors at ODU that relate to cybersecurity. The four that I chose were, criminal justice, an actual cybersecurity major, computer engineering, and cyber systems security. When we dig into the meaning of these major they all play a role into cybersecurity. In criminal justice there are many departments that use software to protect some kind of important data or personal information. Even though most people think of CJ, as a major that focuses on crime and law. Homeland security is a department that will use special technology to protect the department from cyber attacks. As we dig into the major of cybersecurity, it can consist of information technology, computer engineering and its sprinkled with a little bit of criminal justice. Since in this time of society, we cannot get through a single day without out computer, cellphone, etc. so in often terms, we have to deal with the risk of people trying to get our personal information, and date through the internet, which is called a cyber hacker. So within that major they deal with the threats, but also protect of technology, and supply us with new updated data. Next we look into criminal justice major. Like I stated above people think cj just deal with law and crime but it can get deeper than that. When people get into legal trouble this falls under the CJ major. Obviously when someone commits a crime like a cybersecurity its a very big fine, and can result into jail time as a felony charge. Computer Engineering is cyber security, but on a much broader aspect. Computer engineering involves cybersecurity due to the data that this major holds. The software development, and dealing with computer networks all falls within this category. Cyber systems security is a cut and dry major. This major is just a a fancy way of saying cybersecurity. The basics of this major deal mainly with the data base part of cybersecurity. Just about all of cybersecurity deals with the data aspect of a software, and these people in this department, monitor the data, make sure its up to date and working correctly for a system.
JOURNAL ENTRY 3
Describe four ethical issues that arise when storing electronic information about individuals.
Ethical issues play a very big part in cybersecurity. When people work in this department, they see ample amount of peoples information daily, and its up to them to not leak or steal the information. Four issues that come into conversation of issues we face are privacy, security breaches, data inaccuracies and system decisions. Privacy is a big deal as well as security. If we don’t have good security, we don’t have good privacy. When storing electronic information, there are many ways someone can get a hold of it. on the other hand, it can be easier for outside people to gain access, if they are working with people on the inside. There is a limitation of trust and respect that goes into hiring people to work in cybersecurity, because they see all of our information. Next when it comes to system themselves, they have to work properly to store all of this information. If a system isn’t up to date, then how can it be trusted to store valuable information. This is why software and systems, get updates regularly due to the fact of effectiveness.
JOURNAL ENTRY 4
Compare cybersecurity risks in the U.S. and another country.
In other countries, obviously their cybersecurity can very different from the US. When we look into other countries, they might not have the special resources we have, or the training, or even the need for cybersecurity itself. Just because we have more of a technological advice doesn’t mean that everyone does. I want to focus more on comparing if another country has the resources or if they have proper training vs the US. Proper training is the key fact to this. If someone doesn’t know how to use a software or data, how can they accurately do their job? In other countries, this is a problem they face. Most of the time the US is more advanced in technology, so we have proper training, because we have better resources. Resources are an important part of of technology growth and understanding. If a country doesn’t have a computer, or even the right wifi, then they cannot get the proper data software working efficiently. Their product has to be stable and well working to secure peoples information in a safe manner. When it comes to proper training that is a whole different scenario. In order to handle this information we have to know how it works. in the event of a data breach we would have to know how to handle that. So when it comes to people in other countries they might not have as many data breaches as we do, so that would make them have less training to prepare for one. Also, this might sound strange to say but maybe they dont have cybersecurity in the extent of how the US does. The US is always under someones radar due to our excessive quality of resources and data information, that the US is not ALWAYS prepared, because like we say “life happens”, but we as a country is more prepared, than most people.
JOURNAL ENTRY 5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.
Create an app to fight against data breaches
Yearly updates to software
Build strong networks
Exercise cybersecurity classes for companies
Relentless bug finding
Start a business catching people who do cyber attack
Earning a profit
Cryptography
Use firewall technology
Recreate software for companies
IT training
Treat malware and phishing before it happens
Yielding consulting
JOURNAL ENTRY 6
How has cyber technology created opportunities for workplace deviance?
Work Place deviance is when in simple terms, is when a person or group intentionally try to cause harm to an organization, or whichever workplace they reside at. Some examples of this includes sexual harassment, show hostility toward coworkers. Other examples can be displayed intolerance of people of other nationalities and cultures. When we look into cybersecurity itself, it holds a lot of personal information, and data. There are many departments that rely on cybersecurity, so in order to build a department, we have to hire people to work that specific task. Then we have the people who get hired, but they have bad intentions for their work place as a whole. If someone doesn’t like the how the company is running, and they state their opinion to their boss, and nothing goes noticed, that person can get aggravated and want revenge on the department, depending on the extent of the issue. In other terms this could go outside of the harassment, and people in the work place can obtain peoples information to commit fraud or even try to sell data to the companies. People like to get revenge and act on anger, but what they don’t know is, if you leak personal information that is a violation within that company, and could face legal charges. Being a woman and I would in a restaurant, I see first hand with harassment and its an ugly thing to put up with, even at at work. Sometimes people say jokes, and in the moment of it all happening they don’t think it makes that person feel uncountable so them as human beings, keep going about the conversation without realizing the other persons feelings.
JOURNAL ENTRY 8
1. What are the costs and benefits of developing cybersecurity programs in business?
JOURNAL ENTRY 9
1. How can you tell if your computer is safe?
Its many ways you can detect if your computer is safe. staring with the most simple way is installing a software to detect viruses and other issues with your computer. People make software to make sure we as people on the outside, feel safe about or computer. Outside of us having the feeling of our own computers we can also reply on the software of our computer once we buy it. Most computers already come with a stable security system, but depending on what a person does as far as a job or just in their spare time, they want to have that extra sense of security. When companies build laptops, and computers they have this key feature in mind, because we always face the risk of people hacking into computer systems. Most of the time your computer will let you know if a threat is happening, by sending you notification to your computer. Most of the time, well mainly speaking for myself I always ignore the notifications mainly because I just dont think about that stuff like that. Still mainly talking about myself I dont think about things like this. Yeah of course we have virus that exist, but until my laptop physically goes crazy, I dont worry about how safe my computer CAN be i just use it when I need it and hope that everything goes okay. Another way you can tell your computer is safe can be how it acts. If your computer runs slow and always has a glitch then maybe you should know your computer has some issues going on, and its not all that safe.
JOURNAL ENTRY 10
1. Describe three ways that computers have made the world safer and less safe.
1. We have better communication. the fact of having computers makes it easier to send emails, video chat, or even locate thing by gps. by communicating with other parties, like when it comes to the government its very vital for them to communicate for safety purposes. The government needs to have computers to monitor things like what other countries are doing whether its good or bad. if we didn’t have computers then we couldn’t have that third eye to watch other people on the outside.
2. the point of computers being less safe is for sure the lack of privacy. most of the time computers come with webcams, it for most people it takes nothing to hack into someones welcome and see what their doing without them even knowing. years ago it was a big issue that peoples computers were being hacked and they were being spied on.
3.another way for commuters to be unsafe, is peoples information is easier to get ahold on. i have had my card hacked so many times, it almost became a norm for me. One particular event that happened to me, I will never forget was when someone hacked my account through a computer and made a whole new card without even being remotely close to be. All of this took place in georgia. It amazed me because how can someone access my information through a computer, and remake a whole new card, without me even being n the same state.
JOURNAL ENTRY 11
1. How do engineers make cyber networks safer?
Engineers really dont get enough credit when it comes to cybersecurity. They make networks safe by constantly making improvements to networks. the basic structure are based around engineers. When making these softwares and firewalls, they look into the concept of if they are safe enough to uploaded to a computer, or even if the software will do its job correctly. the key to making it safer is to look into how this network will benefit the person using it. They also have to keep in mind why people use networks all day and everyday. networks are a complex software and they are constantly changing. as they change engineers use that changed information to enhance new networks. When they are issues in a network engineers, work together to locate any issues that have came about.
JOURNAL ENTRY 12
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
In the world of criminal justice, if you commit a crime then you face legal action, depending on the extent of the crime, but most of the time law enforcement will get involved. They are laws set out to protect society from harm and cybercrime is in fact frowned upon on. When people commit cybercrime it goes into the category of fraud, embezzlement and so much more. When a person is caught doing those crimes, law enforcement steps in to take action. A person can face legal charges as well as jail time. Any type of crime will always fall in the place of criminal justice.