Journal #3

Describe four ethical issues that arise when storing electronic information about individuals. 

Due to the multiple cybercrime attacks that are targeted at organizations on a daily basis, ethical issues will always be a concern when it comes to storing electronic information about individuals. Four main ethical issues that I see as problems are: privacy, confidentiality, fraud and misuse, and sabotage. Ethical issues will continue to be a concern for people because of the sensitive and vital information that they relay on the internet every day.

Privacy

Privacy has become a major issue due to the fact that multiple users do not have control over how their data is being used. Companies are now gathering people’s data at an alarming rate with policies that force the consumer to give up their personal information without declining unless they do not want to use their services. Once an individual has consented to their data being comprised by an organization, it is now on the web for any individual with malicious intent to seize. Consumers should have the choice of how their data is being used and should educate themselves on the risk that they assume by providing their personal information on the internet.

Confidentiality

Confidentiality issues are central to ethics in cyberspace. Because of the nature of their work, security professionals come into contact with a wide range of sensitive information, including personal, private, and proprietary information. A virus check on a hard drive can yield tasty tidbits about someone’s personal or professional life, but revealing them could jeopardize their career or personal life. Because of the critical information they have at their fingertips, cybersecurity workers should all be professionals.

Fraud and misuse

It’s possible for a computer to generate a unique atmosphere conducive to illicit activity. Traditional titles for these crimes include theft, fraud, embezzlement, extortion, and so on. Forgery on a computer system, theft of money, theft of financial instruments, and theft of services are all examples of computer-related fraud. Theft also involves stealing valuable information.

Sabotage

Computer crimes, such as unlawful use of computer facilities, information alteration or destruction, data file sabotage, and computer system vandalism, can target the computer as a target of assault.  Computer sabotage violates the security of your computer and involves altering, damaging, or destroying data, hardware, or software. Short-circuits and bombs have been used to attack computers. Ethical difficulties are difficult to address when these themes are sensationalized with real-life horror stories.

References

  1. (III) Ethical Issues. (n.d.). 03. (III) Ethical Issues; www.niatec.iri.isu.edu. https://doi.org/03. (III) Ethical Issues

Ethical Issues in Cybersecurity: CompTIA’s Future of Tech. (n.d.). CompTIA’s Future of Tech; www.futureoftech.org. https://doi.org/Ethical Issues in Cybersecurity: CompTIA’s Future of Tech

Chukwube, J. (2022, February 11). Information Security Next-Generation – Infosecurity Magazine. Infosecurity Magazine; www.infosecurity-magazine.com. https://doi.org/Information Security Next-Generation – Infosecurity Magazine

Journal #2

Select four other majors offered by ODU and explain how those majors relate to cybersecurity.

According to the National Center for Education Statistics, Old Dominion University’s cybersecurity program ranks sixth in the nation, which makes it one of the top schools to attend to pursue an education in cybersecurity. While cybersecurity is a popular program to choose from at ODU, there are other majors related to cybersecurity: computer science, cyber operations, criminal justice, and business management.

 Computer science is related to cybersecurity in that it includes the study of computers, encompassing computational theory, hardware and software design, algorithms, and how humans interact with technology. Students interested in computer science as a major often pursue careers in finding solutions to problems within the realm of computers related to cybersecurity. Hence, cybersecurity is a field for finding solutions to problems. Having this knowledge as a computer scientist will allow an individual to gain intensive computer knowledge, which would help them immensely in the cybersecurity world.

 Cyber Operations is the second program that relates to cybersecurity because it involves all aspects of military cyber-related operations, such as network and infrastructure protection, collection, and evaluation of data in support of combatant commanders. Cyber operations and cybersecurity are very similar since they employ the same ideas and methods when it comes to gaining access to computers, computer systems, or networks to gather information without necessarily harming the functionality of the accessible system. Cyber operators also monitor and analyze network traffic to protect networks and information. They must monitor system operations and respond to events that occur in response to triggers or when unexpected activity is recognized. This is very much like cybersecurity when you are trying to get into another network.

The next major is criminal justice, taking an interest in cybersecurity as it provides the tools and skills needed to investigate crimes involving computers and network systems. As cybercrimes continue to grow, more and different crimes will continue to rise, and we need strict laws to punish criminals who violate people’s and businesses’ data for their own gain. We must always keep an eye on our networks and improve our security tools to avoid becoming victims of cybercrime.

Another major that shares a relationship with cybersecurity is business management. This is because cybersecurity is not just a free software you can download and be protected from harmful people in the cyber world; it is an art and a skill that takes time to develop, and as a company, you only want qualified people working for your company to ensure you are protected from cyber predators. Therefore, we can also conclude that business degrees will always have a relationship with cybersecurity.

Journal #1

Why are you interested in cybersecurity technology?

I am interested in cybersecurity for a variety of reasons, the most important of which is to ensure that people’s and businesses’ personal information and data are safe from malevolent hackers all over the world. I’ve always had a fascination with computers, especially when it came to installing software to see how it would run on my computer and installing hardware to improve the performance of my machine. When I was younger, I had no idea that computers and the technology that is created inside of them would mold and shape our everyday lives for the better; but with every good, there is always an evil that must be battled, which is where cybersecurity specialists come into play. The sector of cybersecurity need experts who are willing and eager to safeguard people and organizations from hackers, and I am excited to be one of such individuals in the near future.

In today’s sophisticated cyber world, there are numerous channels for hackers to attack people and corporations in order to obtain access to personal and secret data.  Individuals with minor computer knowledge must be informed on the types of malicious assaults that could be targeted at them, as well as how to reduce such risks. To help lessen those dangers, I intend to become a penetration tester after finishing my studies at Old Dominion University. As an ethical hacker, I intend to operate on the “red side” of penetration testing, gaining legal access to a company’s computers and networks in order to undertake security evaluations. Ethical hackers possess all of the skills of a cyber criminal, but instead of exploiting and harming enterprises, they use their expertise to assist them in growing and succeeding. As long as computers and the internet are required in the future, cybersecurity professionals will be needed to safeguard the safety of others as they utilize computers in their daily lives.