Describe four ethical issues that arise when storing electronic information about individuals.

There are various ethical standards in storing electronic information for various individuals because of the increased cyber insecurity cases. Issues such as confidentiality and privacy allow companies to keep information about an individual that happens that the information would be shared. Privacy is a significant concern because the company can have information about the individual with the data saved on technological devices at risk of confiscation. Storing the information must ensure that individual information must be confidential to the authorized personnel and used for the required purpose. The next issue is the security breaches because it threatens patient privacy when various confidential individual information is availed to others without the apparent consent of the owner. Sharing information should happen with the person’s consent to avoid breaching core ethical values. Another core value arising is implementing the system, which is vital in companies because implementation would lead to loss of confidence by individuals and their safety concerns because implementation procedures were not efficiently followed.

It also arises when workers do not know the transparent processes correctly and how to use them; thus, systems implementation is crucial for consideration. Another ethical issue for consideration is the data inaccuracies to prevent data losses through transfers. It is of more significant concern because data losses during transfers would raise various concerns about whether the initial data available was inaccurate or accurate in the initial stages. There are possible data transfers between departments or systems; thus, misspelling various figures would change the actual data figures, thus creating completely inaccurate data that could interfere with an individual’s essential information. Using correct individual data for medical or legal purposes is ethical because it achieves the rightfulness and liability of the person.
Appropriate use of data is an efficient, ethical issue on individuals’ electronic information because the company needs to store information for a reasonable time with the specific intended use. The use of data for unintended purposes for an organization’s self-interest is unethical since it would cause harm to innocent individuals.

Select four other majors offered by ODU and explain how those majors relate to cybersecurity?

While criminal justice involves a system where various crimes and criminals are identified, judged, and punished for their offenses to give justice for the victims relates to cybersecurity, which relates to crime prevention. Various security breaches involve cyber forensics, leading criminal justice response through their comprehensive collection of digital evidence, including multiple computer files, social media data, criminal phone records, and emails. Through a proper chain of custody, evidence analysis is done and presented for investigation; thus, justice could be achieved through cybersecurity.
Cybersecurity has a significant relation to engineering works where cyber engineers apply electrical engineering knowledge and computer science to increase their understanding of cyberspace. The engineers use the skills efficiently developed through digital forensics, security policy, and other network defenses to perform various cybersecurity duties and carry out engineering hardware and software. Cyber engineering is linked with resolving multiple cybersecurity issues.
Victimology refers to identifying the motives and targets of attacks, thus preventing cyber society attacks such as the most common spear-phishing, undertaken in sending various sophisticated massages or emails to fool the victims. Threats arising attract the security team to investigate and determine the reality of attacks and their severity. Therefore, victimology increases the chances of preventing cyber-attacks, thus enhancing cybersecurity in detecting crimes before they are committed and potentially reducing cybercrimes. Victimology provides a protection system that indicates alerts towards blocking all forms of cyber-attacks such as spear-phishing.
Cybersecurity is a section in information technology that involves protecting various computer systems and preventing authorized access to different electronic data saved within the plans. Cybersecurity extensively focuses on defending mobile devices, computers, and electronic systems from malicious attacks, while information technology focuses on the strategies that store and transmit digital information. Cybersecurity secures multiple information technology devices from cybersecurity threats to secure their data from external cyber-attacks, thus proving essential.

How has cyber technology created opportunities for workplace deviance?

According to the Oxford Dictionary, deviance is “the act or state of departing from conventional or accepted standards, especially in social or sexual behavior.” In the cyber technology business, workplace deviance is more likely to occur since it may occur via the web rather than face to face, making it more difficult to detect. When an employee is unsatisfied with his or her employer, regardless of whether he or she was dismissed or thinks he or she was owed something, such as a promotion, the employee is apt to lash out against the company. If an employee is let go from a job in the cyber technology sector, for example, he may download important information and sell it to competing firms for financial gain if he done so prior to his departure. If the employee’s authorization to return to work is not restricted, he may continue to do harm to the business. Since a consequence, this would be deemed workplace deviance, as it violates the firm’s behavioral norms.

 Employees that are disgruntled with their employment disable their security systems, exposing the firm to attack in another instance of workplace cyber technology deviance. As a consequence, the firm would be exposed to hackers entering the system and stealing vital data. Because it is significantly more difficult to trace down a person engaging in damaging behavior behind a computer screen than it is to hunt down a person who is physically there and may be seen on a surveillance camera, for example, cyber technology has created new possibilities. This allows the person to do more damage for a longer period of time before being found. In general, cyber technology has increased the likelihood of workplace deviance occurring, while also making it easier to commit and more difficult to detect. While workplace deviance will always exist in all types of occupations, the usage of cyber technology simplifies the act of engaging in deviant conduct.

Describe three ways that computers have made the world safer and less safe.

In the twenty-first century, computers have penetrated almost every area of our lives. Almost every aspect of contemporary life is impacted by technology, from transportation efficiency and safety to food and healthcare accessibility, sociability, and productivity. There are several advantages to computers, as well as countless ways in which they have aided us in recent years in making the world a better place. There are a number of disadvantages to utilizing computers, and they are not without flaws, as previously indicated.

Our communication abilities have been increased by the use of computers and other technological advancements. As technology improves, new types of electronic communication have been introduced, including social networking, voicemails, emails, and even video conferencing. As a result, we’ve been able to significantly minimize the time required to send data where it needs to go. Additionally, it has a beneficial effect on our personal relationships, schooling, and business pursuits. Effective communication is critical. Their usage helps people to stay connected, which is especially beneficial for those with family members stationed overseas. Maintaining ties requires communication. As we all know, communication can have downsides. Individuals who are physically near to them may quickly lose sight of them. Additionally, they may get obsessed with social media, resulting in a lack of social skills when engaging with others.

Then came computers, which fundamentally transformed our educational system. We now have increased access to information as a consequence of the internet’s growth. We may acquire books, photography, music, and videos from the convenience of our own homes. Utilizing the enormous amount of information available on the internet enables individuals to feast on information. Individuals, like me, who are unable to physically attend classes on a college campus may take advantage of online courses to get the knowledge necessary to further their jobs. Individuals from all around the world may now learn about many cultures and ideas thanks to the introduction of computers. While having unlimited access to anything on the internet is tremendously convenient, it has also exposed us to a multitude of hazards. Every online behavior is tracked, and each place we visit leaves a digital trace. Hackers and fraudsters are well aware of this and are actively seeking to exploit it for financial gain. Of course, like with everything else in our lives, technology has equipped us with the tools necessary to protect ourselves and ensure our safety as our lives progressively migrate online.

How do engineers make cyber networks safer?

Cyber security networks can always be improved to ensure user safety. Cyber networks communicate frequently with other users to ascertain how they were attacked in order to make updates and reduce their vulnerability to cyber-attacks. Engineers design and maintain cyber networks, and are constantly looking for ways to improve them. It is critical to develop new cyber networks because it makes it more difficult for hackers unfamiliar with a system to gain access. Additionally, engineers will keep the cyber network current so that any vulnerabilities discovered can be patched. This is also critical because it ensures the network’s overall security and the security of everyone who uses it. Another useful tool for engineers working with cyber networks is the ability to track all network attacks. This can demonstrate both what needs to be done to improve safety and what is working. As a result, they would be able to enhance the cyber network. Engineers collaborate on cyber networks to track and prepare for attacks.

 Engineers contribute to the overall safety of cyber networks by developing new and improved cyber networks that make it difficult for unauthorized users to access them, as well as updating existing cyber networks. The updates ensure that the cyber network is free of flaws and that all users are safe and secure. Due to the growing importance of cyber security, engineers are constantly working to improve cyber networks. Due to the ease with which a computer can be accessed, cyber-attacks are rapidly becoming one of the most prevalent types of crime. Due to the increasing prevalence of cybercrime, engineers must continue to develop secure and dependable networks for users. People to use in order to protect them.

Compare cybersecurity risks in the U.S. and another country.

Cyber-attacks against infrastructure and businesses are a frequent occurrence in the United States. Because so much of the world is at odds with the United States, we become a tempting target for terrorist attacks. A large number of businesses in the United States have gone online and are expanding. In the United States, phishing attempts account for the vast majority of cyber-attacks. This accounts for 60 percent of all assaults committed around the world. Keeping up with the latest assaults and tactics is an ongoing challenge. In response to COVID requiring more remote access, there are more systems online, and many of these systems are not properly configured and are therefore vulnerable to attack. The vast majority of assailants in our country start from this point. These dangers are spreading throughout the world, and a number of other countries are facing similar issues to ours. Several prominent Americans believe that Russia or China is responsible for the vast majority of the hacks that we receive on a daily basis. Actually, the United States is the source of the vast majority of the attacks we receive, with China a distant second and Russia a distant seventh on our list of sources.

According to a recent report, the United States is ranked sixth in the world when it comes to cyber security. Not the best, but it isn’t the worst option either. Algeria came in last place out of a total of 60 countries studied, placing it below the poverty line. Russia, for example, has a thriving cybercrime scene with hacker groups. They have a black market for cybercrime that is worth $2 billion per year. They now have 30 highly skilled cybercriminals on their payroll, some of whom may be state-sponsored agents of influence. In addition, there are hacker groups in China that are backed by the Chinese government. A requirement for them is to serve in the military as well. The Chinese government has been carrying out these attacks for years, and they are still being carried out by the Chinese military. The United States is not the only country under attack; a number of other countries are also under attack.

How can you tell if your computer is safe?

To help you decide whether your computer is safe, we’ll guide you through the method and explain everything in clear English. While your duties as a home user are less rigorous than those of a security guard at your place of employment, the fundamental concepts of security remain the same. Recognizing the items, you’ll need to protect yourself starts with identifying the items that must be kept secure in your hands. The first step in this technique of handling the issue is to create a list of all of your connected devices. It is advantageous to be able to operate with a computer. Is it functionally equivalent to a personal computer? Is this a tablet computer or something else? What is a smartphone and how does it differ from a tablet computer is a common question? To be deemed safe, devices must at the very least have essential security features such as an anti-malware file scanning, device access password or passcode protection, and data encryption. If you own a “dumbphone” that is still capable of connecting to the Internet, a Blu-ray player, or a vehicle without a screen, you need not be concerned. It is your obligation to check your computer at least once a week for things like software verification and remaining current on computer updates, as well as to do any required repairs.

If you want to ensure that everything is operating properly, you may download software that will do the required checks for you. Your computer’s Operating System (OS), whether Apple or Windows, should already have some type of firmware, and the system’s setup settings should provide a health check option. Firmware is a kind of software that is pre-installed on devices prior to usage. Although the firmware includes a firewall and anti-virus protection, they are relatively basic security capabilities, and it is recommended that you enhance these features with an anti-virus software package from one of the top ten antivirus providers. Additionally, you may use a firewall application to provide additional security, although the majority of firewall functions are already built into your computer’s operating system’s firmware. This is especially critical for people who use their computer for business purposes, as you may need the added security of permitting remote access to their system. If you wish to increase the security of your web browser, you may do so by adjusting the security and privacy settings in the browser’s options menu. All of these procedures will safeguard your PC against possible dangers.

What are the costs and benefits of developing cybersecurity programs in business?

Cyber security measures must be done by organizations. They have the capacity to safeguard a company’s data from hackers and human error. On the other hand, establishing cyber security requirements could be prohibitively expensive. The first setup, which would require paying a cyber-security organization to travel to your house and install their system on your equipment, would be one of the expenditures. To ensure maximum protection, the firm must undertake study into the type of cyber security program it wishes to install as well as the areas where it believes it is most vulnerable to assault. The time it would take to train your workers on the new technology would be the second expenditure. It will cost money to employ an outside instructor, but the most of the time will be spent teaching. Employees would need a few weeks to acclimatize to the new system and check that they were not putting themselves at risk of a cyber-assault. Ongoing maintenance would be the costliest component.

When newer versions of software become available, companies must upgrade their software to stay current. This assures that your system is secure and capable of fending off cyber-attacks and other security dangers. One of the most essential benefits of having a cyber-security system is that your firm will be secured against cyber burglars. A hacker may seek to acquire access to your system if your organization is Apple, for example, in order to steal the design for a future iPhone and transfer it to a competitor. Cyber security software that secures your personally identifiable information may be able to prevent this. Cyber security solutions are vital since they preserve your employees’ personal safety. Personal information about you and your staff, such as your name, address, and phone number, can be divulged if your system is hacked. In general, the long-term benefits outweigh the expenditures of creating and sustaining cyber security measures, regardless their high cost.

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

As technology advances, the line between criminal punishment and cybercrime becomes increasingly blurred. As a result of technological advancements, traditional crime has evolved into a limitless and borderless creature. According to Payne and Hadzhidimova’s article “Cybersecurity and Criminal Justice: Exploring the Intersections,” “our understanding of the relationship between crime and technology has lagged behind technological advances that have impacted criminal behavior.” Cybercrime has grown to such proportions that a new field known as digital forensics has emerged to investigate “cyber, computer, electronic, or other types of cybercrime” (Payne & Hadzhidimova, 2019). To incorporate cybercrime into the criminal justice system, the criminal justice system had to rethink its classification and perception of crime. Government regulations did not define cybercrime or the consequences of its commission until relatively recently.

Florida was the first state in the United States to enact and implement a computer crime statute in 1978. Given the pervasiveness of technology in almost every aspect of our lives (banking, education, social, etc.), it’s only natural for criminal justice to develop a more sophisticated cybercrime curriculum for students, as well as tactics for addressing such a diverse range of crimes. Identity theft occurs when someone exploits another’s good name and (possibly) financial information for their own gain. Due to the Internet’s disassociation and anonymity, such a crime could be committed in the privacy and comfort of one’s own home. When malevolent entities are well-trained and leave scant to no evidence, investigators face a new set of challenges. These cybercrimes begin to infiltrate not only the criminal justice system, but also the financial and legal systems, necessitating the development of policy in those communities to address cybercrime when customers or even entire institutions become victims. Numerous people have died as a result of cybercrime, which is widely regarded as one of the gravest threats to financial institutions, governments, investors, businesses, and (most recently) educational institutions.

How does cyber technology impact interactions between offenders and victims?

The dynamic between victim and attacker has shifted in contemporary culture as cybercrime has become increasingly sophisticated on a global scale. Historically, crimes were committed face to face with the perpetrator. For example, robbery was previously defined as physically removing something of value from another person. As a result, the victim is frequently physically terrified, and they may be hesitant to venture out alone in the near future. The widespread use of the internet has resulted in a dramatic increase in crime in today’s society. Cybercriminals are equally capable of wreaking havoc as they are in person, and they do so with equal ease. According to the FBI, if a cyber-criminal gains access to a company’s software, the criminal may steal and resell the company’s data for profit. Even if this occurs online rather than in person, it is considered robbery under the law.

This offense carries the same penalty as if the perpetrator committed it in person. Victims of crime in today’s society are victimized in a variety of ways, owing to advancements in cyber technology. Someone can be a victim of a crime and remain completely unaware of it for several days. This is because many people are unaware of what to look for or what red flags indicate that they have been a victim of various types of cybercrime, making them more susceptible to becoming a victim. A critical component of increasing cybersecurity awareness is educating people about what to look for in order to avoid becoming a victim of cybercrime or, if they do become a victim, to recognize and stop it immediately. Cybercrime will continue to grow in popularity over time, and while it is not as dangerous or frightening as traditional crime, it may cause individuals to feel as if their sense of privacy has been eroded.