Journal Entries
- I find cybersecurity to be highly interesting because I believe it’s a crucial element in our modern society. I believe that it was previously largely disregarded and that it only recently began to get attention on a global scale. I believe that the rise in both the quantity and complexity of cyberthreats justifies the importance of cybersecurity technologies. Cyber attackers are adopting sophisticated ways to avoid detection and compromise systems, from nation-state actors to criminal gangs. As technology develops and grows, new security dangers will appear, necessitating the necessity for businesses and people to be alert and prepared. Another reason why I’m interested in cyber security is that I could help protect critical infrastructure and sensitive data from things that could hurt our nation like cyberattacks, data breaches, and other security mishaps. In the current digital era, corporations, people, and essential infrastructure all significantly rely on technology, making it a prime target for hackers. These organizations are susceptible to theft, fraud, and other criminal behaviors that could harm people and organizations if they don’t have adequate cybersecurity protections in place. Nonetheless, I have a few family members that are in the cybersecurity field and it seems like they have a blast in it. I often hear that cybersecurity is a fantastic field to get into right now because there is such a huge need for experts in this field. To sum everything up, I am interested and appreciative of cybersecurity because it uses technology to protect sensitive data and vital infrastructure, keep ahead of developing cyberthreats, ensure privacy, and ensure regulatory compliance. Additionally, I am already familiar with some facets of the profession because a few of my family members are in the cyber security field, so I feel like I will keep enjoying it as I grow as a cybersecurity major, and I hope to become apart of something good.
- Old Dominion University offers a variety of majors related to cyber security. These majors include information security, computer science, information systems, and cyber security engineering. Designing and creating safe computer systems and networks is the focus of the major in cyber security engineering. The fundamentals of network security, cryptography, and computer security are taught to students. They also get first-hand exposure to the most recent and updated technologies. Students who study computer science gain a thorough understanding of computer systems and programming languages. Students study software engineering, data structures, and algorithms. Additionally, they receive knowledge of the most recent security innovations. The usage and administration of information systems are the focus of the information systems major. Database design, system analysis, and network security are all topics that students study. Information systems and networks are the main targets of information security. Risk management, security guidelines, and security architecture are taught to students. These majors are related to cybersecurity in multiple aspects. The most important features of these majors focus on computing and programming. Protecting networks, systems, and programs from cyberattacks is the focus of the IT and computer science subfield of cyber security. Some courses that are required for most of these degrees include, CYSE 270 (Linux System for Cybersecurity), CYSE 280 (Windows System Management and Security), IT 150G (Basic Information Literacy and Research), CYSE 409 (Crime and Computer Applications), and CS 390 (Introduction to Theoretical Computer Science). Overall, a variety of majors in cyber security are available from Old Dominion University. Students who major in these fields will acquire the knowledge and abilities necessary to defend computer networks and systems from harmful intrusions.
- Keeping electronic records of people presents several ethical questions that could have far-reaching effects on both people and society as a whole. Here are four of the greatest significant ethical problems that come up when gathering and maintaining electronic data. One of the most essential human rights is the right to privacy, which can be violated by the gathering and storage of electronic data. There are major concerns about privacy violations when information is stored electronically because it can be accessed, utilized, and shared without the individual’s knowledge or consent. As an illustration, businesses might gather and keep consumer data for marketing purposes, which might include delicate personal data like health or financial records. The use of this information can then go beyond what the person originally authorized, such as selling it to other parties or using it to target people with advertisements. Another major concern is the protection of electronic data. Data breaches and hacking incidents can happen, which can lead to sensitive data being taken or used improperly. For instance, one of the biggest credit reporting companies in the United States, Equifax, had a data breach in 2017, exposing the personal information of close to 150 million people. Sensitive data, including Social Security numbers, birth dates, and addresses, were acquired as a result of the breach and may have been used inappropriately. It can also be difficult to ensure the accuracy of electronic data since mistakes can be made when entering data or when software breaks down. For instance, errors in credit reports can significantly hinder a person’s ability to get loans, credit cards, and other financial items. Inaccurate information can also be used to make decisions about critical issues like insurance, employment, and other things, with grave repercussions for people. Discrimination issues may also arise from the usage of electronic data in decision-making procedures like credit or employment applications. Decision-making algorithms that use electronic data may be prejudiced or discriminatory toward some groups, like women or underrepresented groups in society. For instance, the National Bureau of Economic Research showed that algorithms used to decide which borrowers to lend money to were biased against African Americans and Latino borrowers, resulting in higher interest rates and fees for these groups. In conclusion, the gathering and storing of electronic data presents a number of ethical issues that people, businesses, and legislators must take into account. It is essential to create and implement strict privacy and security standards, to guarantee information veracity, and to prevent discrimination in order to ensure that electronic data is acquired and utilized in an ethical and responsible manner. Sources: Equifax Data Breach: What to Do (Consumer Reports), The Algorithmic Bias Detection Problem (National Bureau of Economic Research), The Right to Privacy (United Nations).
- Both developed and poor nations are affected by the significant and worldwide challenges to cybersecurity. However, there are regional differences in the specific threats and difficulties associated with cybersecurity. Here is a comparison of cybersecurity threats in China and the United States. Intellectual property theft and data breaches are the main cybersecurity dangers in the US. The nation is a prime target for cyberattacks since it is home to a significant number of high-value targets, including financial institutions, defense contractors, and technology firms. Additionally, the United States has an extremely advanced information infrastructure, which can leave it open to cyberattacks. As part of their efforts to strengthen cybersecurity, the U.S. government and private sector businesses have used encryption technologies, routinely audited their security procedures, and spent money on R&D. The main cybersecurity concerns in China are caused by censorship and government control. The Great Firewall of China is one of many tools used by the Chinese government to monitor and restrict online activity. The Chinese government has extensive control over the nation’s internet. The nation is also home to a sizable population of hackers who partake in cybercrime, theft of intellectual property, and cyber espionage. The Chinese government has come under fire for its cyber espionage operations, which have targeted other governments and private companies. Despite these contrasts, there are a number of cybersecurity issues that both the United States and China must contend with, including the increased sophistication of cyberattacks, the sophistication of information systems, and the quickening speed of technical advancement. Both nations have been making investments in cybersecurity research and development as well as the creation of new technology and laws to reduce these threats. In conclusion, there are many different and severe cybersecurity dangers, and both China and the United States have particular difficulties in this field. Governments, corporations, and individuals will need to cooperate and work together to strengthen cybersecurity and protect against cyber threats in order to address these risks in an effective manner.
Sources: The State of Cybersecurity in the U.S. (PWC), Cybersecurity in China (Council on Foreign Relations), The Global Risks Report 2021 (World Economic Forum).
5. C-Cybersecurity Auditing, Y-Yellow Teaming, B-Bug Bounty Programs, E-Email Security Services, R-Risk Assessment and Management Services, S-Security Auditing and Testing, E- Email Security Solutions, C-Cybersecurity Consulting Services, U-User Behavior Analytics Solutions, R-Risk Assessment and Management Services, I-Identity and Access Management Services, T-Threat Intelligence Services, Y-Yellow Teaming (a combination of red and blue teaming).
6. Workplace deviance, which is any activity that goes against company standards, has been made possible by cyber technology in many different ways. New types of deviance that were previously impossible have emerged as a result of the growing use of technology in the workplace. Computer hacking is one of the biggest ways that cyber technology has made it possible for workplace deviation. Hackers have the ability to steal sensitive data from a company’s computer system, including client information, trade secrets, and financial data. The organization and its stakeholders stand to lose a lot from this kind of outrageous behavior. Cyberbullying is one more way that cyber technology has made it possible for workplace misbehavior. Workers can bully and harass their coworkers through messaging apps and social media sites. Cyberbullying can result in lower morale, more staff leaving, and possibly legal action. The use of cyber technology has also given rise to chances for time theft by workers. Employees who utilize business resources—like the internet or social media—for personal purposes while at work are said to be committing time theft. The organization may incur expenses as a result of this type of aberrant activity. The usage of mobile devices in the workplace has opened up new potential for misconduct. During working hours, employees are allowed to view offensive content, snap pictures, and record videos. This conduct may result in a hostile workplace environment and legal action. Last but not least, cyber technology has made it possible for workers to commit fraud. Employees can fool clients, coworkers, or superiors by using false identities or manipulating data, for instance. The organization may suffer considerable financial losses as a result of this activity. In addition to reputational harm, workplace deviation has increased thanks to cyber technologies. These are only a few instances of the types of abnormal conduct that employees may exhibit. Employers must adopt stringent standards, offer training, and keep an eye on workers online activity in order to prevent and address workplace deviance.
7. Developing cybersecurity plans for businesses has costs and advantages. Cybersecurity programs are created to safeguard an organization’s information technology (IT) infrastructure from online dangers like malware, phishing, and hacking.
Costs:
The financial expense of creating cybersecurity programs is one of the biggest costs. Programs for cyber security demand a large investment in personnel, technology, and software. These expenses can add up, particularly for small enterprises with scarce resources. The time and effort needed to build and manage cybersecurity programs is another cost associated with their development. To stay up with emerging threats and technology, cybersecurity systems must be updated frequently, which necessitates a continual time and resource commitment. A company’s operations and culture may need to adapt significantly in order to implement cybersecurity measures. Employees must adapt their behavior and follow new policies and processes, which might be difficult.Benefits:
Creating cybersecurity initiatives for businesses has many advantages. An organization’s IT infrastructure is first and foremost protected by cybersecurity programs from cyber threats, which can cause large financial losses and harm to the organization’s brand. Programs for cybersecurity also aid in ensuring adherence to rules and legislation governing data security and privacy. Legal and financial repercussions may occur from breaking these laws. Additionally, implementing cybersecurity measures can raise client confidence in the company’s capacity to safeguard their private and financial data. Increased consumer loyalty and repeat business may result from this. Cybersecurity initiatives can also give a business a competitive edge by allowing it to send and retain sensitive data—like trade secrets or private customer information—securely.There are expenses and benefits to establishing cybersecurity strategies in businesses. The benefits of defending an organization’s IT infrastructure, guaranteeing compliance, boosting consumer confidence, and obtaining a competitive advantage are equally as significant as the financial cost and work necessary to build and maintain cybersecurity programs.
8. A few things you can do to see if your computer is safe include installing anti virus software, firewalls, and updates. Some things that may show signs of an infected computer are pop ups and strange messages.
Antivirus software: Installing and keeping up-to-date anti-virus software is a pretty solid indicator that your computer is secure. These items can aid in keeping your computer safe from viruses and other harmful items.
Firewall: A firewall is a type of security measure that helps protect your computer from hackers and other potential invaders. It functions as a large barrier that only allows positive things to enter while keeping out bad ones.
Updates: Keeping your computer’s software and operating system up to date will also help to keep it secure. These updates frequently include significant security improvements that can aid in defending your machine against potential dangers.
Pop-ups and unusual messages: If you frequently encounter pop-ups or strange messages on your computer, there may be a problem. Do not click on them or enter any personal information; instead, simply close them and perform a malware scan on your computer using the antivirus software.
These are some precautions you may take to keep your computer safe. Just keep your software up to date, be cautious of unusual notifications, and keep your anti-virus software running.
9. Ways that computers have made the world safer:
Improved emergency response: Computer systems are used to aid emergency response activities by delivering real-time information regarding disasters and emergencies, allowing rescuers to recognize and respond to crimes faster.
Enhanced security measures: Computers are used to create and implement security measures that safeguard individuals, businesses, and nations from cyber attacks, theft, and fraud.
Medical advancements: Computers have been used to research new medical procedures, analyze health data, and improve patient care, resulting in millions of people living longer and healthier lives.
Ways that computers have made the world less safe:
Cybercrime: Computers have made it easier for criminals to carry out cybercrimes such as identity theft, financial fraud, and cyber attacks, which can have serious consequences for individuals and businesses.
Privacy violations: Computers have made it easier for governments, organizations, and individuals to monitor and acquire personal data for surveillance and other reasons, prompting concerns about data breaches and privacy misconduct.
Cyberbullying and online harassment: Computers have made it way easier for people to engage in cyberbullying and online harassment, which can cause victims emotional distress and have a detrimental effect on their mental health.
10. Engineers can design cyber networks and systems with security in mind from the beginning. This includes identifying potential vulnerabilities, deploying robust encryption mechanisms, and limiting unauthorized access. Engineers can also conduct frequent security audits to uncover flaws in existing systems and prospective dangers that may have gone unnoticed. Engineers can create incident response plans that include how to respond to a cyber attack or breach, such as procedures to isolate the danger, reduce damage, and restore services. Cyber dangers are always evolving, and engineers must stay up to date on the latest threats and technologies in order to defend networks and systems successfully. Engineers can advise users on cybersecurity best practices such as generating strong passwords, avoiding questionable emails and links, and routinely storing up data.
Engineers play an important role in ensuring the security of cyber networks and systems by designing safe systems, conducting frequent security audits, building incident response plans, staying up to date on the latest threats and technologies, and teaching users.
11. Cybercrime is a criminal violation that involves the use of technology, and as such, it is subject to the criminal justice system’s jurisdiction (Jaishankar 2011). Law enforcement authorities have an important role in investigating and prosecuting cybercrime cases, identifying and apprehending cybercriminals, and adopting prevention measures (Alazab, Venkatraman, & Watters, 2018). Furthermore, the criminal justice system is in charge of enacting and implementing cybercrime legislation, as well as holding cybercriminals accountable for their actions (Jaishankar, 2011).
There are various ways in which criminal justice and cybercrime ties to other areas that were covered in this class. For instance, the ethical and legal ramifications of cybersecurity and cybercrime have significant legislative and regulatory implications, and concern issues with privacy, data protection, and digital rights (Holt & Kilger, 2016). In addition, significant research is being done in the domains of sociology and communication studies on the social and psychological effects of cybercrime on victims and society as well as the influence of technology on human behavior (Stamatellos, 2013). The technological components of cybersecurity, such as network security and encryption, are important in different fields of study.References:
Alazab, M., Venkatraman, S., & Watters, P. (2018). Cybercrime investigation: An overview of current practices and legal frameworks. Journal of Forensic Sciences & Criminal Investigation, 7(1), 1-8.
Holt, T. J., & Kilger, M. (2016). Cybercrime and digital forensics: An introduction. Routledge.
Jaishankar, K. (2011). Cyber criminology: Evolving a novel discipline. International Journal of Cyber Criminology, 5(1), 1-31.
Stamatellos, G. (2013). The social impact of cybercrime on society and individuals. Journal of Financial Crime, 20(2), 202-211.12. The way criminals and victims communicate with one another has significantly changed as a result of cyber technology. The nature of interactions between offenders and victims has undergone a dramatic transformation since the development of the internet and the widespread use of digital devices. Previously, interactions between offenders and victims were largely limited to face-to-face encounters as well as communication through traditional methods such as phone calls or postal mail.
One of the most significant ways in which cyber technology has impacted interactions between offenders and victims is through the ease and speed of communication. Today criminals can quickly and easily contact their victims by using a range of digital tools, including social media sites, messaging applications, and email. Since offenders can continue to be present in their victims’ lives constantly, in some situations this can result in an escalation in harassment, stalking, or threats. Criminals can now more easily hide their identity and their behavior thanks to cyber technology. Criminals can commit crimes without worrying about being discovered or recognized by using anonymous online profiles or encrypted communication technologies. This could result in a sense of invincibility among criminals and make it challenging for victims to seek justice.
Cyber technology has simultaneously given victims new ways to get support and assistance. Online tools like chat rooms, forums, and hotlines give victims a safe, anonymous opportunity to communicate with people who have gone through similar experiences. In some circumstances, victims might also be able to use digital proof to support a case against their perpetrator.
Interactions between offenders and victims are impacted by cyber technology both favorably and unfavorably. While it has made life easier and improved communication, it has also given criminals additional opportunity to act unlawfully and avoid prosecution. It will be crucial for lawmakers and law enforcement organizations to keep up with technological advancements and to devise plans to reduce the risks posed by crimes enabled by the internet.
13.
Creating efficient cyber-policy and infrastructure requires careful consideration of numerous elements, such as technology breakthroughs, increasing threats, and shifting geopolitical dynamics. Because of the unpredictable nature of cyber attacks and the continually expanding technological landscape, it is difficult to foresee what types of threats will emerge in the future and how to best protect against them.
Given the “short arm” of predictive knowledge, adopting a proactive approach to cyber-policy and infrastructure development becomes even more crucial. This means staying current on trends, engaging in research and development, and cooperating with industry experts to identify emerging dangers and build effective remedies.
At the same time, we must recognize the limitations of our predictive knowledge and embrace a flexible, adaptive approach to cyber-policy and -infrastructure development. This involves preparing for unforeseen events and constantly reassessing and modifying our tactics in response to new facts and feedback. In short, effective cyber-policy and infrastructure development necessitates a combination of foresight, adaptability, and teamwork. While the limitations of our predictive knowledge may provide obstacles, we can construct a more secure and resilient cyber ecosystem for the future by remaining proactive and adaptive.