{"id":206,"date":"2025-11-26T20:46:09","date_gmt":"2025-11-26T20:46:09","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/?page_id=206"},"modified":"2025-11-26T20:46:09","modified_gmt":"2025-11-26T20:46:09","slug":"discussions","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/discussions\/","title":{"rendered":"Discussions"},"content":{"rendered":"\n<p>Week 1: Discussions<\/p>\n\n\n\n<p>Hello all, my name is Chase Lawson and I transferred in as Junior with two Associates degrees from New River Community College and Wytheville Community College.\u00a0 I am from a small town called Galax here in Virginia.\u00a0 I have various hobbies including playing golf, watching various sports and going to various conventions and obtaining collectibles.\u00a0 I have taken several online courses over the time that I have attended community college.\u00a0 I have interned at a small computer company.\u00a0 They were a relatively small company that had a small range of services from pc hardware and software support to technical to support for mid-range companies.\u00a0 I have started an ePortfolio but I am excited to learn and add more to it.\u00a0 My goal after graduation is to obtain a job in cybersecurity but I have yet to decide in which path I want to take with cybersecurity.\u00a0<\/p>\n\n\n\n<p>====================================================================<\/p>\n\n\n\n<p>Module 2 Discussion<\/p>\n\n\n\n<p>I think the principle of determinism relates to computer hacking by accepting the idea that introducing computer&#8217;s into the world set in motion the causality of hacking.\u00a0 When computers were first built it was hard to foresee that they would have vulnerabilities or anyone could figure out how to manipulate computers.\u00a0 Ethical\/Non Ethical hackers alike would test and probe to see how far they could push the boundaries and gain access to sensitive information.\u00a0 I think in terms of computer hackers themselves, I think that there could be preceding events that cause &#8220;new age&#8221; hackers to learn how to hack.\u00a0 Some for notoriety others for financial gain. \u00a0In my opinion the production of computers laid the foundation of computer hacking<\/p>\n\n\n\n<p>====================================================================<\/p>\n\n\n\n<p>Module 3 Discussion<\/p>\n\n\n\n<p>When it comes security breaches and human error, there could be a broad range of reasons for the security breach.\u00a0 For instance, an end-user falls for a phishing scam, they are a target of a social engineering attack or they simply just download an application that appears to be legitimate but it&#8217;s full of malware.\u00a0 To reduce these kinds of errors I think the most important way is end-user training.\u00a0 With phishing to an unsuspecting person might respond to a fraudulent email thinking they are communicating with a higher level employee like a supervisor, when in reality they are just communicating with an actor.\u00a0 This could cause them to fall for a scam like giving up a personal cell phone number, or downloading a zip file that&#8217;s imbedded in the email.\u00a0 There are ways to mitigate phishing attempts, like using a training application called knowbe4 this is used to provide end-users with training to focus on key words within an email, unfamiliar domains and a range of things that could go along with phishing.\u00a0 With Social Engineering someone could coerce an unsuspecting person in resetting a password for the actor to gain access to an application or site that contains sensitive information of the target.\u00a0 With someone downloading a bad application someone might want to do some research into what they are downloading.\u00a0 They can Google it or read reviews.\u00a0 To improve security people should change passwords regularly and use multi-factor authentication (2FA).\u00a0 I think to improve security someone would want to look at the top cybercrime trends and defenses.\u00a0 Make sure they have an antivirus that regularly updates their virus library.\u00a0 Another improvement in security is the use of Virtual Private Network (VPN) that way it becomes harder someone to trace an IP address.\u00a0 I think it would definitely help to enroll in some cybersecurity training programs as well.<\/p>\n\n\n\n<p>==================================================================<\/p>\n\n\n\n<p>Module 4 Discussion<\/p>\n\n\n\n<p>In today&#8217;s world there are a wide range of social networking sites and how we interact with one another.\u00a0 There a plethora of sites where you can make post&#8217;s, share ideas, and or opinions.\u00a0 I think this opens the door for victim precipitation.\u00a0 Once something is posted then it&#8217;s there forever and it isn&#8217;t like writing with pen and paper.\u00a0 Once it&#8217;s shared it cannot be taken back, chances are someone has already seen it and there is a high chance a screenshot was taken.\u00a0 Having said that, if someone posts something on a social networking site that someone else doesn&#8217;t like than the other person more than likely will react negatively to it.\u00a0 This is what I think cyber victimization is.\u00a0 A person who participates in social networking can easily become a victim by what they post.\u00a0 They can open themselves\u00a0 up to harassment, and cyberbullying.\u00a0 I think this is very problematic in today&#8217;s society.\u00a0\u00a0<\/p>\n\n\n\n<p>====================================================================<\/p>\n\n\n\n<p>Module 5 Discussion<\/p>\n\n\n\n<p>First I think that neutralization theory best explains why there is cybercrime.\u00a0 Even though the theory was developed before there was such a thing as cybercrime the theory can be applied to cybercrime.\u00a0 It starts off with Denial of Injury.\u00a0 The neutralization theory dives into reasons hacker or cyber criminals use to justify why they are hacking in the first place.\u00a0 They will justify no one is actually being physically harmed or someone deserves it.\u00a0 They can also justify it by stating that the victim will learn something from the hack or intrusion.\u00a0 Hackers may also justify it for political reasons.\u00a0 I think all these reasons can best explains why the neutralization theory fits.\u00a0 I also think that the cognitive theory best explains it as well.\u00a0 I believe to be true that people that have been hurt will in turn be capable of harming others.\u00a0 Someone with a rough upbringing can potentially have the motive to become hackers and harm others.\u00a0 They will likely engage in cyberbullying or harassing others.\u00a0 Behavioral Theory works as well because hacking is something that is learned behavior as well.\u00a0\u00a0<\/p>\n\n\n\n<p>==================================================================<\/p>\n\n\n\n<p>Module 6 Discussion<\/p>\n\n\n\n<p>I like the idea of the human firewall.\u00a0 Much like the long pipe it becomes everyone&#8217;s responsibility to stay informed and inform others.\u00a0 The flow of information is necessary, the more people are informed of scams they are less likely to fall for scams.\u00a0 People need to be aware and less trusting.\u00a0 For starters when it comes to connecting to public wifi if people were better informed on what the WIFI SSID (network name) was then they would know not to connect something obvious like Starbucks_Free_WIFI I like the idea of people staying up to date on the latest cybercrime trends and what to watch out for.\u00a0\u00a0<\/p>\n\n\n\n<p>====================================================================<\/p>\n\n\n\n<p>Module 7 Discussion<\/p>\n\n\n\n<p>In this video Ruben Paul demonstrated how he could hack household items to be exploited.\u00a0 One of the ways this video relates to what I have read is cybersecurity and colleges.\u00a0 In the reading it details that the college has created a wide range of data and on teachers and students and that information is in cyberspace.\u00a0 Since there is so much data in cyberspace it makes colleges a target for security breaches.\u00a0 If household items can be hacked such as google home or ring cameras than more information can be exploited.\u00a0 Another way this video relates to what I have read is cybersecurity and religion.\u00a0 Religious institutions keep a record of it&#8217;s members, names, addressee&#8217;s, telephone numbers.\u00a0 Since church&#8217;s cannot afford the same cybersecurity measures as companies makes them an easy target to for cyber attacks.\u00a0 Religious institutions can and most likely will be a target of ransomware.\u00a0\u00a0<\/p>\n\n\n\n<p>====================================================================<\/p>\n\n\n\n<p>Module 8 Discussion<\/p>\n\n\n\n<ol start=\"1\">\n<li>How Data Mining by the Government can have an impact on society.&nbsp; Data Mining is the process of searching through various database&#8217;s collecting information and looking for patterns on individuals and this can have a profound impact on society.&nbsp; This raises concern because citizens may not be aware of who is collecting their data and what it is being used for.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>\u00a0  2. Is there a natural right to privacy? Most if not all people use some form of social networking, whether that be Facebook, Twitter or some sort of chat function.\u00a0 This information that we share online can be intercepted without us knowing about it.\u00a0 This is a question that has raised some concerns with the ability to track someone online.\u00a0<\/p>\n\n\n\n<p>====================================================================<\/p>\n\n\n\n<p>Module 9 Discussion<\/p>\n\n\n\n<p>Economics intertwines with cybersecurity in a multitude of ways.\u00a0 Global economic loss&#8217;s due to cyber attacks outweigh global economic spending on cybersecurity by a wide margin.\u00a0 Cyberattacks can effect business&#8217;s and corporations in many ways.\u00a0 They can disrupt productivity and bring the companies to a complete halt.\u00a0 Cyberattacks can affect anything in the digital marketplace.\u00a0 By 2017 the global loss&#8217;s reached nearly 1 trillion dollars due to cyber attacks with that number growing every day.\u00a0 There is a term that is used called the underground economy and this is based off financial transactions that that occur when someone has gained property of someone else like credit cards and bank account information.\u00a0 Business&#8217;s and cooperation&#8217;s invest in cybersecurity to attempt to thwart attacks but that doesn&#8217;t account for attacks they can&#8217;t see coming.\u00a0 Zero day attacks occur and these attacks can come without detection and can have major impacts.\u00a0 The economy is affected in many ways including identity theft, breached medical records and peoples bank accounts.\u00a0 The best way to mitigate this is to properly balance money between training and cybersecurity.\u00a0 When it comes to economics cybersecurity becomes a necessary tool.\u00a0 With proper training people can better protect themselves and their information<\/p>\n\n\n\n<p>====================================================================<\/p>\n\n\n\n<p>Module 10 Discussion<\/p>\n\n\n\n<p>There are a lot of reasons people do not report cybercrimes when they become victims of the crime.\u00a0 I think the biggest reason why they do not report is they are oblivious or unaware that they have became victims until it&#8217;s too late.\u00a0 A hacker could install some kind of virus that can create a backdoor into their system.\u00a0 Their computer can have a keylogger that can monitor keystrokes or their onboard microphone could be activated and become an eavesdropper.\u00a0 This can be used to gain access to username and passwords to all sorts of e-commerce and banking sites.\u00a0 Another reason is there could be fatiguing to report such crimes.\u00a0 They have to know the proper authorities to report the crimes and have detailed information on the crime.\u00a0 They may not know who to report the crime to and if&#8217;s not a substantial loss they may feel like they don&#8217;t need to worry about it.\u00a0 I think another reason the crime isn&#8217;t reported is they shame they may feel about falling for some kind of scammed.\u00a0 They may fall for some sort of phishing or smishing scam that could end up costing them money.\u00a0 Lastly victims may try to resolve or handle the issue themselves instead of seeking proper authorities.\u00a0\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Week 1: Discussions Hello all, my name is Chase Lawson and I transferred in as Junior with two Associates degrees from New River Community College and Wytheville Community College.\u00a0 I am from a small town called Galax here in Virginia.\u00a0 I have various hobbies including playing golf, watching various sports and going to various conventions &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/discussions\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Discussions<\/span><\/a><\/p>\n","protected":false},"author":31284,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/wp-json\/wp\/v2\/pages\/206"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/wp-json\/wp\/v2\/users\/31284"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/wp-json\/wp\/v2\/comments?post=206"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/wp-json\/wp\/v2\/pages\/206\/revisions"}],"predecessor-version":[{"id":207,"href":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/wp-json\/wp\/v2\/pages\/206\/revisions\/207"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/wp-json\/wp\/v2\/media?parent=206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}