Journal #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

The development of cyber policy and infrastructure must take into consideration a number of factors that are critical to the development of policy and infrastructure. As technology grows and advances, policy and infrastructure must advance as well. Without these two concepts growing together, technological advancements will be hindered from further expansion, with a setback that will be detrimental to cyber space as we know it now. Cyber policy and infrastructure introduce the concept of “predictive knowledge” as an attribute of “cyberspace,” which is highly sensitive and vulnerable in its operation due to the nature and characteristics of the medium used to communicate and conduct business. When predictive knowledge is applied to cyber-assets, it is based on a eudaemonic philosophy of control (i.e., manipulation), and it is a methodology that can evaluate what constitutes reasonable behavior in this particular context. As with expected utility, we can focus on the expected use-value of cyber “weak points” to get closer to our goals of not only predicting them, but also building them, setting up the conditions for their acceptance by the people who are most interested. When it comes to figuring out “how to do cyber,” those who start with policy and infrastructure are almost always going to have a blind spot. Even though they are well aware of the issues at hand, including the critical need for “cyber-armies,” security certifications, deterrence through strength, and the development of an international cyber-security regime, they are unsure of the solutions. Government insiders, especially those who work on policy, agree that information technology (IT) isn’t a fixed thing, but they also know that IT is vulnerable to bad people and that attacks on the system can make it slower. As these two will coexist in the growth of our future, cyber policy will always require advancement alongside infrastructure.

Journal #12

How does cyber technology impact interactions between offenders and victims?

People have profited from cyber technology in that it has made their social and commercial lives more fun and convenient, but it has also provided offenders with easy access to communicate with the victims of their choosing. Social media and hacking tools, both of which are easily available on the internet, enable criminals to fulfill their objectives. Individuals must be aware of the risks they are taking when they use social media because of the potential danger that could be lurking on the other side of their computer screen or phone.  People appreciate publishing images of themselves as well as information about the locations and events that they are currently going on social media. Individuals that engage in this type of activity are unaware that their behaviors are being observed and studied by their adversaries in order to assist them in organizing an assault. Posting images with location services enabled can reveal your whereabouts to a perpetrators, which can aid them in their attempts to cause you harm in the future. Social media is a fun piece of technology, but if it is not utilized with caution, it can and will have a detrimental affect on a person’s life in a negative way. As individuals, we enjoy expressing ourselves about what is going on in our lives, but we must remember that everything we do in the online realm carries a certain amount of risk. The internet world has also provided offenders with a substantial quantity of information that can be used to harm a person’s reputation for many years to come, if they so want. People who post on a social media platform must be constantly mindful of the content that they are disseminating since once that content has been uploaded to the internet, it will remain there in perpetuity.

Journal #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

There are unavoidable connections between the criminal justice system and cybercrime. Technology has a critical role in criminality since it is implicated in a significant share of crimes. If you commit a cybercrime, you are breaking the law, and the criminal justice system will hold you accountable. A point of intersection between the criminal justice system and cybercrime is the study of human variables, which criminologists use to understand human behavior. In criminal justice and cybercrime, criminologists talk about the role of the human factor. In addition, those with a background in criminal justice may be more prepared to work in the easier parts of cybersecurity because of their education and training. Forensics in the context of computer, electronic, and other cybercrime investigations is an important part of the field of cybercrime. Digital forensics is another area where criminal justice and cybercrime overlap because it was created by criminal justice professionals. Consequently, academics in the field of criminal justice play a key role in the development of digital forensics. How criminal justice can be used to help identify appropriate cybercrime activities and reactions is one of the most major areas of overlap. Other topics studied in this course may have a connection to these connections. A few of these cyber crimes are hacking, malware, identity theft, social engineering, and software piracy. These crimes can be committed by an individual who enjoys a high degree of respect and social standing within the industry or profession in which they work. These crimes can also be committed in retaliation to a company for reassigning them from their job or because they do not adhere to showcasing the proper ethics of how they should conduct themselves in an organization. The criminal justice system and cyber crime will always share a connection as technology and the need for individuals to commit crimes will continue throughout society. 

Journal #10

How do engineers make cyber networks safer?

As cyber attacks become more common as a result of hackers’ malicious intent, cyber networks will need to be upgraded and secured on a regular basis to protect its users. Network engineers defend individuals against cyber assaults by designing, building, and configuring new network infrastructure as well as maintaining and upgrading current network systems. People are protected by network engineers who conduct assessments and penetration tests, build secure network solutions, and manage security technology systems. People will be able to utilize computers and the networks with confidence thanks to the safeguards put in place by network engineers.

Assessments and penetration testing are one way network engineers make cyber networks safer. Penetration testing is a type of security assessment that involves simulating cyberattacks on a company’s computers and networks. These allowed tests aid in the detection of security flaws and vulnerabilities before they may be exploited by hostile hackers. By providing secure network solutions, network engineers also make cyber networks safer. Using firewalls to block out unwanted activity and ensuring that open ports are closed so they cannot be breached by hackers, backing up data in case a system is breached, downloading and installing anti-virus and malware protection software to aid in the security of networks from unwanted access, and using two-factor authentication whenever possible to enhance the security of networks when accessed by users are just a few examples of how they do this. Managing security technology systems is another method network engineers make cyber networks safer. This is performed by inspecting networks and ensuring that systems are up-to-date on a regular basis, diagnosing any issues that may develop and devising a way to resolve them, and evaluating new security features to see whether they are more helpful than what is currently in use. In the cyber world, network engineers play a critical role in ensuring the safety of our computer systems and the people who use them.

Journal #9

How can you tell if your computer is safe?

Just like anything in life that we care about, we want to make sure that it is safe and secure. When it comes to computers, we always want to make sure they are safe because of the personal and professional data that they store for us. There are many ways to ensure that computers are safe. A few of those ways are: testing your settings, updating browser plug-ins, testing your firewalls, and permanently deleting files. By ensuring that you do these things on a regular basis, your computer will be safe from the cyber world.

Testing your system will provide you with information about any potential problems with your system. The Microsoft Baseline Security Analyzer is a free pop-up tool that can analyze your computer to show you these problems. MBSA can also let you know if your passwords are secure enough for hackers to not be able to crack them, if your system is set up to receive automatic updates, and if you have folders that are shared with other networks that you might not know about. Another way of telling if your computer is safe is to make sure your browser plug-ins are updated. Having updated browser plug-ins will make it harder for attackers to compromise your systems as patches are made for vulnerabilities that have been breached since the previous update. One more way of knowing that your computer is safe is by testing your firewalls. A firewall keeps hackers from seeing your computer online when they’re searching for victims. To know if your firealls are secured, you can do a port test to see if your computer can be seen by the outside world. One more way of knowing that your computer is safe is by permanently deleting your files. A user can click delete on a file to get rid of it, but that does not mean a certain file is no longer on their system, which can be compromised by a hacker with the right tools and knowledge. Permanently deleting files that are of no use to you can ensure that your computer is safe from the outside world. If these few ideas are followed and utilized on a regular basis, they will ensure that your computer is safe from hackers and cyber threats that always surround us.

Journal #8

Describe three ways that computers have made the world safer and less safe.

Computers have made the world a safer place on the one hand, but they have also made it a less safe place on the other. Nobody could have predicted that computers would evolve into the dual-sided machines that they are today when they were first introduced into society. We think of computers as allies, but with only one click, they can turn against us. Understanding how computers can both keep us safe and hurt us is a lesson that almost everyone has learned while using computers at some point in their lives.

Computers have made the world a safer place by defending us with clever weapons systems, storing and encrypting our personal files, and allowing people to interact without having to meet in person. The ability to detect enemy threats before they reach our borders has given the American people a sense of security, knowing how sophisticated our computer systems are at protecting lives from attacks. Similarly, computers are capable of storing personal information and protecting it from prying eyes who could harm you by stealing files that should only be accessible to the user. Computers also provide a safe haven since they allow individuals to communicate face-to-face without having to be face-to-face in the event of a pandemic such as COVID-19.

Computers have also made the world a more dangerous place by allowing hackers access to personal data, causing health risks from spending so many hours a day staring at displays, and allowing minors access to information that they should not be watching. Yes, software may be installed on computers to identify any threat that could damage the system, but there are hackers who can circumvent certain security and gain access to personal files and data. Furthermore, due to the blue light emitted by computer monitors, spending too much time in front of a computer screen might affect your eyesight and cause you to have restless nights. Computers can also be damaging to children due to the large amount of inappropriate material that they supply. I believe that computers are fantastic machines that, when utilized correctly, can greatly benefit society, but that when used incorrectly, they can hurt the public.

Journal #7

What are the costs and benefits of developing cybersecurity programs in business?

According to current data, data breaches can cost a firm billions of dollars if their customers’ personal information and other sensitive data is stolen. As I previously stated, this figure is an average. It can rise depending on the severity of a data breach, which in the worst-case scenario compels businesses and organizations to close due to irreversible damage to their assets and reputation. Taking this into account, the cost of deploying cyber security procedures outweighs the cost of data breaches for the firm. The key benefit of establishing cyber security programs and protocols is that they can give your firm a competitive advantage. The optimal way for implementing cyber security programs is for them to be integrated into the organization’s IT governance. IT governance is a process for explicitly aligning IT strategy and rules with organizational goals. The company’s aims and objectives will be met as a consequence of the integration of these tactics. This alignment, based on previous experience, provides a significant benefit to the organization because IT expenditures and security solutions are matched with business activities and will provide enough input during the cost-benefit analysis and ROI (Return of Investment). However, this integration neglects to address the security of the systems in place, which is an area that the majority of businesses overlook. For the organization’s top executives, integrating all of these methods can be a difficult undertaking. An initial assessment should precede the integration and selection of the appropriate IT security solutions for the firm. Perform an initial review of the organization’s security measures and policies. This will provide them with a starting point as well as information on the existing state of their network security. During the integration process, this will also assist the company in identifying critical functions and risks. After all of the areas have been handled, the systems will be integrated.

Journal #6

How has cyber technology created opportunities for workplace deviance?

Cyber technology refers to a group of digital technologies that include virtual reality, social networking, and multimedia, as well as soft computing, cloud computing, and mobile computing. Cybersecurity is critical because it safeguards all types of data against theft and loss. PII and PHI are all types of sensitive information that fall under this category. This includes intellectual property, data, and governmental and industry information systems. “The fact or state of straying from conventional or recognized standards, especially in social or sexual behavior,” defines deviance. Workplace deviance is more likely to occur in the cyber technology industry since deviation can occur through the internet rather than face-to-face, which is more difficult to detect. A common example of workplace deviance is when an unhappy employee decides to vent his frustrations on his employer, whether he was fired or believes he earned something he didn’t get, such as a promotion. In the world of cyber technology, for example, if an employee was fired before leaving, he might download important material and sell it to other organizations for a profit. If that employee’s authorization hadn’t been blocked, he may have returned to work and continued to hurt the organization. This would be considered workplace deviance because you are not following the company’s expectations. Another example of cyber workplace deviance is disgruntled employees shutting off their security systems, leaving the organization vulnerable to attack. As a result, the organization would be vulnerable to hackers infiltrating the system and stealing sensitive data. Because it is far more difficult to locate a person who is committing destructive acts behind a computer than when they are in person and can be recorded on a surveillance camera, cyber technology has provided new options. This could allow the employee to cause greater harm for a longer period of time before being discovered. Overall, cyber technology has increased the number of avenues for workplace deviance to occur, as well as made it simpler to commit and harder to detect. Workplace deviance will always exist in any industry, but cyber technology makes it easier to carry out. 

Journal #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. 

Create training courses

Yahoo advertising to promote you business

Believe in yourself and master your craft

Engineer a software to protect people and businesses

Red team associate for a company

Security Auditing

Ethical hacker for a company

Consultant selling security software

Upload videos on youtube

Remember to get your certifications.

Illustrate pictures of different cyber threats

Teach individuals about cybersecurity from home

Youtube videos about cybersecurity

Journal #4

 Compare cybersecurity risks in the U.S. and another country.

The United States of America and Russia go a long way as rival cybersecurity states, with the USA blaming Russia for being the usual attackers of their systems. Yearly, the United States becomes one of the countries that is subjected to a large number of cyberattacks. In November 2021, for example, a cyberattack targeted US infrastructure and significant facilities across the country. Ransomware hit several high-profile organizations, like Colonial Pipeline, which operates a major oil pipeline. As a result, approximately 58 percent of digital security firms are headquartered there, and they are working to develop new methods to combat the most recent cyber attacks. Remarkably supportive policies and standards are among the country’s techniques. The government continually ensures transparency, productivity, and progress in terms of data security. In this vein, the state has been observed collaborating with stakeholders to cultivate corporate governance by creating frameworks and dismissing bogus cyber security concerns. The US has made joint efforts with allies to implement information security plans, outline cyber defense principles, combat cybercrime, and defend critical infrastructure from cyber-attacks. It has been a resounding success.

Cyber threats to computer routers, firewalls, and other administrative equipment used by government agencies, enterprises, and critical infrastructure providers around the world were blamed on Russia by the United States and the United Kingdom. One year ago, the American intelligence services blamed Russia for intervening in the 2016 presidential election through hacking and a deliberate marketing effort in support of Donald Trump. The Trump administration said that Russia was behind cyberattacks on the United States’ power system.

We have reasonable grounds for believing that Russia does have a strong defense against computer insecurity. However, they experience hacking attacks by states who attempt revenge against the Russian intelligence agencies. Even though they are often criticized by their political opponents for digital cyberattacks and aggression, it is easy to think that they are also aware of how to protect themselves from similar threats and risks.