1. Why are you interested in cybersecurity technology?

I was initially introduced to coding in the 6th grade and took a coding class in the 7th and 8th grades. The class was called “Girls Who Code” where a group of women in the technology and programming field introduce coding to young girls usually between middle and high school ages. This class introduced me to different methods and ways to create a website and eventually convinced me to consider cybersecurity as a career field for myself. Around this time I couldn’t really find a career field that best suited my interests so once I was introduced to coding and programming, I realized this was something I could consider making a living off of.

I’m interested in cybersecurity technology because simply because I’m curious on the background and how the technology works. I thought it would be a good informative elective for me to take that may set me ahead in terms of my major, which is cybersecurity, and some of it’s background.

Four other majors offered by ODU include, Criminology, Computer Science/Computer Information Sciences, Cyber Crime, and Database Administration (Information Systems & Technology). From what I already know about cybersecurity, I know that these few majors listed have been referred too when the topic of cybersecurity arises. For example, criminology or sociology are one of the courses required by ODU for a cyber security major. Computer science/computer information sciences are often seen as the same by different institutions and universities. I’ve seen in some instances these two majors are combined and graduates are able to branch off in whatever field they decide after receiving their computer science degree. I see this as a broad major that includes a lot computer/technology majors into one. Cyber crime is related to cybersecurity because they both explore some sort of threat or danger to sensitive online data and information. As for database administration, both majors include aspects of databases.

ePortfolio Entry#2

Privacy and confidentiality, unethical use of that individual’s information, an individual’s information being sold to outside businesses, and accuracy. Privacy and confidentiality are an ethical issue because an individual that trusts an organization with their information should be granted privacy and protection over any personal information. Keeping that information private and confidential is the correct and ethical thing to do. Unethically using that individual’s information can include holding or saving that information for more than its original use. Duplicating or saving that information is unethical as well. Selling an individual’s information to other businesses and organizations is unethical because it all comes back that to their (the initial business/organization storing the individual’s information) trustworthiness and ethics. Doing anything with that information without the individual knowing is simply dishonest and unprofessional.

According to the Washington Post, it highlights how the U.S. is just as vulnerable or even more vulnerable to cyber attacks than it was 5 years ago. In the Washington Post article The U.S. isn’t getting ahead of the cyber threat, experts say it states, “The nation has become more reliant on technology during the past five years — significantly increasing the targets that hackers can aim at”. It explains how the U.S. usage of technology has increased but the security and protection of these technologies are not the initial thought. In comparison to the cybersecurity risks China face, an article mentions how as the rise of smart devices increase, users are more vulnerable to cyber threats than before. In addition to that, China collects a lot of personal data and information along with online transactions, causing those who’s businesses or organizations have access to this information to be constant targets of cyber threats as well.

https://www.washingtonpost.com/politics/2022/06/06/us-isnt-getting-ahead-cyber-threat-experts-say/

https://www.gdrc.org/info-design/4-ethics.html

https://www.china-briefing.com/news/chinas-cybersecurity-industry-a-market-analysis/

ePortfolio Entry #4

Some businesses and companies are very hesitant on paying thousands of dollars to upgrade security systems and invest in data protection. Businesses and organizations are uncertain about publicly announcing their cybersecurity spending patterns. As it is very difficult to track down the average investment in data protection, associations also have a number of different requirements and demands in terms of cybersecurity. For example, a health care provider might call for a more secure defense/security system in contrast to a restaurant that may not demand as much security or protection. According to the article “The cost of data security: Are cybersecurity investments worth it?”, it states, “According to Gartner, worldwide, organizations spent $71.1 billion in 2014 on information security, and the source predicted that by the end of 2015, that value will increase to $76.9 billion”. The dilemma for some organizations and businesses is the cost of information protection versus the cost of data breaches. In the article it also states, “According to Ponemon Institute’s 2015 Global Cost of Data Breach study, the average total cost of losing sensitive corporate or personal information is approximately $3.8 billion”. The costs to protect data and the costs of losing sensitive data are still pretty high, but its up to that corporation or business to decide which invest they’d rather make.

Cybersecurity dashboards gives information in real time, which allows for companies to have security programs and know that they are truly covered by their security devices, they are certain that their security controls are up-to-date, and they know whether they are working or not. Active risk monitoring allows supervisors and management to know what and how many properties are under threat, and what harm will be done if they are successfully attacked. All in all, there are many benefits of developing cybersecurity programs and businesses. One of the many factors that holds businesses back from these programs and the protection is the cost and investment they require to maintain these programs.

https://www.linkedin.com/pulse/cost-data-security-cybersecurity-investments-worth-wael-aggan?trk=pulse-det-nav_art

ePortfolio #5

How can you tell if your computer is safe?

Each time a laptop of device is purchased, the buyer is usually asked if they want protection over that device. Outside of warranties and other benefits you pay for to protect your laptop, one of the main sources of protection I was introduced to was Norton and McAfee. The two sources have been relevant to almost all laptops and devices my family has. I’ve used both of these sources and felt almost certain that my information and my computer was safe, but how exactly would I know that? When my computer began to run slow, random ads began to pop up, and my computer would glitch, those were signs that my computer could’ve been exposed to a virus and possibly under attack.

Describe three ways that computers have made the world safer and less safe.

Three ways computers have made the world less safe is by holding personal information and documents (I think this has made it safe and less safe in certain cases), allowing for online communication and threats, and access to locations and trackers. Computers holding personal data makes the world more and less safe depending on how it’s used and presented. I consider it less safe because it can be easily accessible if it’s not correctly protected. As computers advanced and people were able to hold online conversations, this also opened the opportunity for online threats and bullying. Which leads me to my last factor, computers are trackable and if the wrong person has access to a specific person’s location, this creates a less safe circumstance for the world. Three ways computers have made the world safer is by creating security codes and authentication, going paperless, and having electronic proof and history. Creating security codes and authentication methods protects important and sensitive information that should only be viewed by an authorized and trustworthy person. As computers evolved we were able to make the world a safer place by reducing our use of paper and creating online resources and documents. Lastly, having electronic proof of documents and history makes the world safer because even after something is deleted, it can always be retraced.

ePortfolio #6

Cyber networks can always be improved and search for new ways to keep up with prevention of attacks and threats. Engineers help improve the devices used by cyber networks which essentially helps improve their defense against threats which allows for cyber networks to become safer. In the article “The Role of Electrical and Computer Engineers in Cybersecurity” it states, “Electrical and computer engineers work on projects at the vanguard of fields like high-performance computing, network engineering, systems design, and manufacturing. For these initiatives to succeed, technical teams must address the constant dangers inherent in our world of high-speed global connections”. Cyber networks rely on engineers to ensure and implement new technologies that will help make cyber networks safer.

ePortfolio #7

1. How does cyber technology impact interactions between offenders and victims?

Cyber technology impacts interactions between offenders and victims because it allows offenders to lure victims by communicating online and possibly gaining enough information for them to be able to track or stalk their victims as well. It opens the door for people/victims to be harassed and stalked online which can be the lead up to worse outcomes. Cyber technology allows for offenders to have better chances of tracking, harassing, and stalking their victims in ways that weren’t possible before technology existed. Although victims are able to block and take other measures to escape their offender, often times the offender can still find ways around those obstacles. Having technology and using tracking features as an offender sets them ahead and gives them more power in certain cases. Offenders also have the opportunity to pose as someone completely different than who they are, allowing their victims to most likely be more vulnerable to their threat or interaction.