Journal 1

Why are you interested in cybersecurity technology?

Security, in its simplest form, protects or defends something of value. My goal in cybersecurity is to do that. Cyber security is defending/ protecting classified information, such as a company’s clients’ medical and personal data. Cybersecurity interests me in the basics of defending information and the broad range of focuses in its respective field. One of the view things that interested me was the increase in cyber attacks on companies and how to identify them. For example, when phishing attacks are being sent to ODU students in the fall, the IT department sends an email warning students and showing them how to avoid getting scammed. When looking at that example and other examples, I picture cyber security as a puzzle that is waiting to be solved. When People find the solution now, it shows other people how to solve the puzzle/ how not to get hacked. Another part of cybersecurity that interests me is the programs they use inside of a VM, or Virtual machine, such as attacker Kali, wire shark, etc. These programs are so interesting because they are used to hack into bypass firewalls, create firewalls, and protect information. This type of cyber security, known as pen testing, uses these programs to hack into websites and secure databases. Companies will pay pen testers to hack into their websites and databases in order to see how secure their sites truly are. Cyber security is so versatile in the sense that there is so much more than what most people perceive. It is so complex and has so many different applications and avenues people can take to maximize the most out of their degrees and fields. Though cyber security is so vast, I still find it interesting, and I cannot wait to see how I am able to add to the field.

Journal 2

Select four other majors offered by ODU and explain how those majors relate to cybersecurity.

There are Four majors that relate to cyber security that ODU currently offers. Those majors are computer science, criminology, computer engineering, and Computer and information systems security/information assurance. The first major related to cybersecurity is Computer science related to cyber security because cybersecurity is actually a branch or subfield of computer science. Computer science actually involves the study and usage of computers. The second major related to cybersecurity is Criminology, which is the study of crime, and although it does not sound like it involves anything to do with cybersecurity, it does. In criminology, there is a thing branch called cybercrime. Cybercrime includes atm fraud, internet fraud, computer viruses, child pornography, malicious hacking, etc. This uses understanding the criminal’s mindset of Criminology and the cyber side of cyber security. A cyber security specialist is often used to trace the offenders by finding who or where the offender is. The third related to cybersecurity is Computer engineering, which includes the building, designing, and testing of computers and software. This is related to cyber because the development of these computers, virtual machines, and software help cybersecurity specialists hack and do their jobs best. Developing the framework makes it easier to apply and use in cyber security. Computer and information systems security/information assurance protects information as well as computers from getting hacked. The Information system security specialist responds to cyber attacks as well as implement software programs just like a cyber security specialist. Cyber security specialists use similar software when responding to cyber-attacks and stolen information. Another way they respond is by using the five pillars or characteristics of the NIST framework. The five pillars are identified, protect, detect, respond, and recover, in which we identify what to protect, protect what we identified, detect any fraudulent activity, respond to the activity if there was any, and finally recover any stolen information or data of our clientele or their devices.

Journal 3

Describe four ethical issues that arise when storing electronic information about individuals.

The four ethical issues that arise when storing electronic information are privacy and confidentiality issues, security breaches, system implementation, and data inaccuracies. Keeping Privacy and confidentiality is important. privacy and confidentiality allow the business to keep information from an individual; however, it may be shared. that is an issue because it can be taken if the data is saved on many electronic devices. Furthermore, sending personal client information back and forth or even to other companies may lead to sending information to the wrong person, Breaching confidentiality and privacy.  Furthermore, it may lead to data breaches. Data/ security breaches are the next ethical issue. Security breaches threaten clients’ privacy and confidential information. This information will then be made available and accessible without the consent of a client. As you see, both privacy and confidentiality issues and security breaches are intertwined, for if either occurs, the other will happen. The next ethical issue that arises when storing electronic information is system implementation. System implementation causes insecurities in the client due to the fact that cyber specialists would not or do not keep up with the workers and do not use the system correctly. The last ethical issue that is found when storing electronic information is data inaccuracies. Firstly, data inaccuracy is when storing information from a client and having the wrong information or even when sending information, it is inaccurate. It is an ethical issue because the data can be lost while sending information; this causes concerns with the patient since their private information is inaccurate. It is very important for cyber security specialists to maintain the privacy and confidentiality of their clientele to protect them and their private information. They must respond to security breaches and ensure that the information is confidential. Finally, they need to ensure that the information is completely accurate and has no inaccuracies. 

Journal 4

 Compare cybersecurity risks in the U.S. and another country.

There are five nations on the Idex:

the United States, China, Brazil, Germany, and India. Each Nation has a different variety of Cyber crimes that are seen in their reports. Out of all the countries, the one that gets the most cyber attacks is the United States. There are a plethora of different ways the world tries to attack the united states, such as Email scams. These email scams make up over 70% of the scams around the world. Many subset scams in these emails involve spam that floods victims’ inboxes, Botnets, fraud, and phishing. Botnets botnet make up 76% of all scams. Botnets are networks of malware-infected machines that can be controlled remotely from the other side of the world via the internet. The hosts for these botnet attacks are India, Vietnam, China, and Russia. Another form of internet scam is fraud, in which the scammers will have a believable title such as winning this iPhone or winning this amount of money. Then the fraud scammers will try to string along their victims as long as they can, making the victims send more and more money. the last scam is Phishing attacks that target the united states.  Globally the untied states’ target phishing attacks make up around 60% of phishing attacks. These scams will use the facade as an IT service or the IRS trying to collect money that people owe to the government. All of these scams affect every nation; however, the United States is vulnerable and gullible. Other countries may face scams that try to steal vital or important militaristic information.  However, according to “ open access,” Other countries such as Ukraine, Brazil, Germany, India, and Russia face similar scams such as malware attacks, email spams, botnets, and phishing.  though each country has a different level of Cybersecurity specialists and protection, they all face similar scams. 

Journal #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. 

C-reate a software that detects attacks on phones

Y-not Pizza website made more resiliate to hacking

B-uild the interface easy for people to use

E-sports two step verification that is secure

R-un pen-testing

S-et up firewalls for different

E-ncourage an acceleration of telsa’s updates including their touch screen and its issues

C-ontract for the U.S. armed forces or any private comapies

U-se computer system to secure important information

R-eintroduce cyber safety protocols for companies or the military

I-ntel data security and breach protection

T-eam up or join Red/Blue team

Y-amaha jetski gps and depth finder software more secure

Jounal 6)

How has cyber technology created opportunities for workplace deviance?

The application of cyber technology has changed the environment for workplace misconduct and workplace deviance. today, Employees now have access to a number of technologies that can be utilized to participate in unethical or illegal acts thanks to the internet, email, voicemails, and social media. Employees now have more opportunities to engage in sexual harassment, cyberbullying, and information theft because of cyber technology. With the development of cyber technology, workplace misbehavior, such as cyberbullying, has grown more and more common. Cyberbullying is when someone is harassed, threatened, defamed, or intimidated through technology. This can be through emails, social media, or company message boards. Such rebellious conduct may negatively affect productivity and morale as well as possible legal ramifications. Another form of workplace misconduct is now made easier by the use of cyber technology is sexual harassment. It is simpler for employees to make unwanted sexual advances when they can send and receive emails, texts, voicemails, and social media posts. They may write inappropriate things online or in an email.  This kind of workplace conduct may result in legal action and a hostile work environment. Finally, the development of cyber technology has facilitated or allowed employee theft of sensitive company and client data. Employees with remote access to corporate networks can quickly access and exploit different types of sensitive information. Serious repercussions, such as monetary losses and reputational harm, can result from this kind of job misconduct. Generally, workplace misconduct has increased due to the use of cyber technology. Theft of personal information, sexual harassment, and cyberbullying are all examples of workplace misconduct that have become more commonplace with the development of cybertechnology. Companies must keep a close eye on employee conduct both in person and online and must take action to stop and deal with inappropriate behavior at work.

Journal 7)

What are the costs and benefits of developing cybersecurity programs in business?

In the digital age, cybersecurity is becoming a major concern for businesses of all kinds. Due to the increase in cyber dangers like data breaches and ransomware attacks, businesses must spend in developing effective cybersecurity solutions to protect their assets and sensitive data. It can be expensive to develop cybersecurity initiatives for firms. One of the primary expenses is the start-up capital required for a program. This calls for making investments in hardware and software, hiring cybersecurity specialists, and training staff members. Also, the program needs constant upkeep, which drives up the cost of cybersecurity. Updates, testing, and monitoring are all continuing aspects of this upkeep. But, establishing a cybersecurity program has many more benefits than drawbacks. The key benefit is preventing sensitive data from being stolen, corrupted, or accessed illegally.This is crucial given the increased frequency of data breaches in order to safeguard a company’s reputation and prevent expensive legal and financial consequences. A cybersecurity program can also help to maintain employee productivity, stop lost revenue, and stop system breakdowns and downtime caused by security breaches. Several industries must adhere to cybersecurity compliance regulations. Establishing a cybersecurity program can help a company meet these requirements and stay out of trouble. Compliance is crucial since it ensures that a business’ cybersecurity program conforms with industry standards and regulations. A strong cybersecurity program may be able to sway clients who are concerned about data security and privacy. This might provide a company a competitive edge in the industry. A cybersecurity program can help stakeholders like consumers and suppliers gain trust in one another. This trust can improve relationships and enhance a business’ reputation. Finally, even though installing cybersecurity systems for firms can be expensive, the benefits exceed the drawbacks by a wide margin. Strong cybersecurity programs can secure sensitive data, increase productivity, help businesses comply with regulations, gain a competitive edge, and build customer trust. Businesses must prioritize investing in cybersecurity technologies to secure their assets and sensitive data in the modern digital world.

Journal 8)

How can you tell if your computer is safe?

The safety of your computer must be ensured at all costs in the modern digital era, where cyber dangers are pervasive. Below are a few indicators showing the computer is secure—the newest patches and updates for security. The most recent security patches and updates installed on your computer are a strong indication that your system is secure. Updates, which are pushed monthly or bimonthly by the computer’s manufacturer,  for the operating system and software are frequently made available by developers to address and fix security flaws. Antivirus Programs are the next step one must take to ensure a computer’s safety. The owner of the laptop must install antivirus software on their computer. It serves as a defense mechanism against several types of malware, including Trojan horses, worms, and viruses. Make sure your antivirus program is current and often checks your system. Another essential tool for defending your computer from unwanted traffic is a firewall. It stops outsiders, including hackers trying to take advantage of security flaws, from accessing your computer without authorization. It’s a solid indication that the computer is secure if the owner of the computer does not encounter any suspicious pop-ups or redirects while browsing the internet. These redirects and pop-ups may be entry points for malware or phishing assaults. Examine your computer for any strange behavior, such as abrupt freezes or crashes, sluggish performance, or unfamiliar programs or files. These could be indicators of a malware infection. Make sure to create strong, one-of-a-kind passwords for each account. This will prevent unauthorized access to your accounts and lessen the chance of a data breach. In conclusion, taking proactive measures is necessary to keep your computer safe. Cyber risks can be reduced on your computer by keeping it updated, installing security software, and being alert for any strange behavior.

Journal #9

Describe three ways that computers have made the world safer and less safe.

Many aspects of our lives, including safety and security, have been transformed by computers. While they have undoubtedly made our world safer in some ways, they have also introduced new risks and challenges that put our safety at risk. Here are three ways computers have both made and made the world less safe. Emergency Response Systems Have Been Improved Improved emergency response systems are one-way computers that have made the world safer. Emergency responders can use computerized dispatch systems to quickly identify the location of a call and dispatch the appropriate resources, reducing response times and improving outcomes. Furthermore, computerized medical records can provide critical information about a patient’s medical history, allergies, and medications to emergency personnel, allowing for faster and more effective treatment. The rise of computers and the internet has also opened up new avenues for cybercrime, which can seriously threaten individuals and organizations. Cybercriminals can use computers to steal sensitive information, such as financial data or personal identities, and then use it fraudulently. They can also carry out cyber-attacks on critical infrastructure, such as power grids or water systems, with serious consequences for public safety. Improved Transportation Security Computers have also improved vehicle safety features and optimized traffic flow, making transportation safer. Computerized systems, for example, can assist drivers in avoiding collisions by providing real-time traffic information, detecting and warning of potential collisions, and even taking control of a vehicle in an emergency. Additionally, computers can optimize traffic flow, reducing congestion and improving overall driver safety. To summarize, computers have made the world both safer and less safe in different ways. While they have greatly improved emergency response systems and transportation safety, they have also introduced new risks and challenges in the form of cybercrime. As technology advances, it is critical that we take steps to mitigate these risks while also maximizing the benefits of computers for public safety.

Journal #10

How do engineers make cyber networks safer?

Cyber networks are an essential component of modern society, serving as the foundation of our digital infrastructure. On the other hand, engineers play a critical role in ensuring that these networks remain secure as cyber threats evolve and become more sophisticated. Here are some ways engineers can make cyber networks safer. Creating Strong Security Protocols Developing robust security protocols is one of the primary ways engineers make cyber networks safer. This entails developing and deploying a layered security strategy that includes firewalls, intrusion detection systems, encryption, and access controls. Engineers must also keep current on the latest threats and vulnerabilities to continuously improve security protocols and stay one step ahead of potential attackers. Conducting Risk Assessments on a Regular Basis Conducting regular risk assessments is another critical aspect of cybersecurity. Engineers must assess a system’s potential risks and vulnerabilities and devise mitigation strategies. Identifying potential attack vectors, evaluating the effectiveness of security protocols, and analyzing user behavior to detect potential insider threats are all part of this process. Performing Regular Security Audits Engineers must conduct regular security audits and risk assessments to ensure that security protocols are functioning properly. This includes analyzing system logs, monitoring network traffic, and performing penetration testing to identify potential system flaws. Engineers must devise strategies to address these flaws and improve the network’s security. Educating Customers Finally, engineers must educate users on how to stay safe while surfing the web. This includes educating users on best password management practices, identifying phishing emails, and avoiding common cybersecurity pitfalls. Engineers can help create a culture of cybersecurity awareness by educating users on how to stay safe online. Finally, engineers play a critical role in making cyber networks safer. Engineers can help protect our digital infrastructure from cyber threats by developing strong security protocols, conducting regular risk assessments and security audits, and educating users on staying safe online.

Journal #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

The convergence of law enforcement, the legal system, and technology in the area of cyber crimes is where criminal justice and cybercrime cross. Criminal acts that use computers, networks, or the internet as instruments or targets are referred to as cybercrimes. Investigating, pursuing, and punishing criminal offenses are all part of the criminal justice system, which includes the organizations, laws, and procedures that uphold and enforce the law. Criminal justice has faced particular obstacles as a result of the rise of cybercrime since it takes specific knowledge and abilities to counter the continually changing nature of cyberthreats. The requirement for cyber law enforcement is a crucial component of the overlap between criminal justice and cybercrime. Law enforcement organizations are essential to tracking down and apprehending cybercriminals, gathering digital evidence, and seeing that offenders are prosecuted. This entails comprehending the technical components of digital forensics and data analysis as well as the subtleties of cybercrime, such as hacking, identity theft, fraud, and other cyber offenses. The complexity of cybercrime also requires legal systems to change, including challenges with jurisdiction, global cooperation, and privacy concerns.The involvement of criminal justice in creating and enforcing laws and policies pertaining to the prevention and reduction of cybercrime is another facet of the overlap. This entails constructing frameworks for cyber incident response, cyber risk management, and information sharing between law enforcement agencies, businesses, and other stakeholders, as well as establishing cybercrime laws, regulations, and standards. Criminal justice experts also design and put into effect tactics for cybercrime awareness, education, and prevention, including programs to inform people, groups, and communities about the dangers and best practices for cybersecurity. Cybercrime and criminal justice intersect with various academic fields like computer science, criminology, sociology, and psychology. Understanding the technical components of cybercrime, creating cybersecurity tools, and examining digital evidence all depend heavily on computer science. Criminology and sociology can shed light on the causes, trends, and effects of cybercrime as well as the socioeconomic and social aspects that affect both cybercriminals and their victims. Understanding the motivations, actions, and character features of online criminals as well as the psychological effects on victims comes from psychology. In order to effectively address the issues posed by cybercrime in the current digital era, it is necessary to take a holistic approach to the overlap between criminal justice and cybercrime, which involves many different disciplines of research and skill.

Journal #12

How does cyber technology impact interactions between offenders and victims?

In the realm of cybercrime, cyber technology has had a profound impact on relations between offenders and victims. Cybercrime is defined as an illegal activity done with the use of computers, networks, or the internet as tools or targets, and it can inlude a wide range of offenses such as hacking, identity theft, online harasment, fraud, and others. The following are some examples of how cyber technology has altered interactions between offenders and victims. One of the most significant effects of cyber technology on relations between criminals and victims is the capacity to commit crimes remotely and anonymously. Offenders might operate from a variety of geographical areas, frequently crossing international borders, and conceal their genuine identity behind onlinepersonas or phony accounts. This anonymity can encourage offenders to perpetrate crimes with less fear of being detected, while simultaneously making it difficult for victims to identify and track down the culprits. Increased scale and scope of victimzation. Cyber technology has also permitted large-scale victimization of persons. For example, phishing assaults, in which perpetrtors deceive victims into disclosing personal or financial information, can be sent to thousands or even millions of people at the same time. Individuals, organizations, and even entire communities may be victimized as a result of this.

Rapid information dissemination is Cyber technology enables the rapid broadcast of information, which can have an impact on interactions between criminals and victims. Offenders might circulate false information, initiate smear campaigns, or engage in cyberbullying through social media, chat rooms, or other online pltforms, causing emotional pain, reputational injury, and other negative consequences for victims. Enhanced grooming and exploitation Offenders can use cyber technology to groom and exploit victims, particularly children, and adolescents. This might include online grooming for sexual exploitation, in which offenders create fictitious identities to gain victims’ trust, or financial exploitation, in which offenders influence victims into disclosing financial information or transferring money. Individuals’ digital footprints left by their online activity can give offenders access to personal information that can be utilized for various sorts of victimization. Offenders, for example, can exploit personal information obtained as a result of data breaches to perpetrate identity theft, financial fraud, or other crimes, causing severe harm to victims. Overall, cyber technology has a complicated and multidimensional impact on interactions between offenders and victims in the context of cybercrime. While cyber technology has provided numerous benefits and opportunities, it has also introduced new challenges and risks, particularly in terms of victim anonymity, scale, and scope, rapid information dissemination, enhanced grooming and exploitation, and increased access to personal information. Understanding these dynamics is critical for addressing and minimizing the effects of cybercrime on victims, as well as devising successful techniques for cybercrime prevention, detection, and response.

Journal #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

When it comes to the development of cyber-policy and infrastructure, the fast developing environment of cyber risks and the “short arm” of predictive information create particular obstacles. Here are some essential issues for approaching cyber-policy and -infrastructure development in the context of inadequate predictive knowledge.

Given the dynamic and frequently changing nature of cyber threats, it is critical to take an adaptive and flexible approach to the development of cyber policy and infrastructure. Traditional techniques that rely exclusively on static policies and infrastructure may become obsolete fast when new threats emerge. It is critical to take a proactive and adaptable approach that allows for constant monitoring, assessment, and adjustment of policies and infrastructure. Cybersecurity is a complex and multifaceted subject that necessitates collaboration among various stakeholders, including government agencies, commercial sector companies, academia, civil society, and people. In order to detect and solve new threats and issues, cyber-policy and -infrastructure should involve engaging various stakeholders in a collaborative and inclusive manner, using their skills and viewpoints.

Cyber-policy and -infrastructure should be based on a thorough understanding of risks and vulnerabilities. While predictive knowledge is limited, a risk-based approach can assist in identifying and prioritizing potential threats and vulnerabilities based on likelihood and impact. This can aid in the effective and efficient allocation of resources, focusing on regions of greatest risk. Given the limitations of predictive information, it is critical to implement proactive and anticipatory steps in cyber-policy and -infrastructure development. Investing in research and development, maintaining current on emerging technologies and threats, conducting frequent evaluations and audits, and engaging in proactive threat hunting and intelligence sharing are all examples of how this might be accomplished.

Building resilience and contingency planning should be prioritized in cyber policy and infrastructure. This includes having effective incident response strategies, backup and recovery processes, and redundancy measures in place to limit the effects of cyber disasters when they occur, even when accurate predictive knowledge is unavailable. Cybersecurity education and awareness among individuals, companies, and communities play a crucial role in minimizing cyber dangers. Efforts to raise awareness, promote best practices, and educate stakeholders on cybersecurity threats, preventive measures, and response tactics should be included in the development of cyber-policy and -infrastructure.

To summarize, the “short arm” of predictive knowledge in the field of cybersecurity necessitates an adaptive, collaborative, risk-based, proactive, and resilient approach to cyber-policy and -infrastructure creation. Despite the limitations of predictive knowledge, policymakers and infrastructure developers may better manage the dynamic and evolving nature of cyber risks by employing multi-stakeholder collaboration, proactive measures, and a risk-based strategy.