Journal Entry #6

on

A cyber network includes computers and other devices that share data and the
role of the engineer is to ensure network safety for the purpose of protecting
assets. With an interconnected network, a virus unintentionally downloaded on
one computer could spread to all the devices within the organization and halt
business functions. Engineers must examine the network to identify
vulnerabilities and reduce or eliminate any potential for exploits. A
cybersecurity engineer can assess the network through established tools and
implement measures to prevent a cyberattack. Risk assessments should be
performed periodically to prioritize risks. An engineer can implement access
control lists, strong passwords, and multi-factor authentication. They can
patch applications; install updates, anti-malware, and firewalls; employ
intrusion detection systems; and run packet sniffers to capture network
traffic. They can also perform research to stay up to date on the latest
breaches.

As a result of our dependence on internet technology, cybercrime has evolved
and requires the knowledge of both cybersecurity and criminology professionals
to research and understand. While cybersecurity focuses on protecting computers
and networks from security breaches through training and technical
interventions, criminology focuses on exploring types of cybercrimes and
understanding cyber offenders. Criminologists developed a neutralization theory
that suggests offenders justify their behavior before committing cybercrimes.
One neutralization is denial of the victim where a cyber offender believes the
victim deserves to be harmed. For example, a disgruntled employee may retaliate
by committing a cybercrime against their employer. Another neutralization is
denial of responsibility where a cyber offender does not think they are
responsible especially as laws are still being created. Digital forensics is a
great example of the overlap between cybercrime and criminology. With the
majority of crimes having a digital component, criminologists can investigate
phones and computers to determine the location of a suspect at a particular
time. They may need to work in conjunction with cybersecurity specialists to
obtain detailed data from electronic devices for analysis. Other disciplines
with an overlap with cybersecurity includes business. Not only do businesses
need cybersecurity to protect their assets, they can also start new businesses
for cybercrime investigation. Sociology will investigate how society influences
cyber offending.

Reference

Payne, B. & Hadzhidimova, L. Cybersecurity and Criminal Justice:
Exploring the Intersections. INPRESS at International Journal of Criminal
Justice Sciences, 1-18.

Bourgeois, D. (2014). Information Systems for Business and Beyond. Chapter 6, 64-74.

Leave a Reply

Your email address will not be published. Required fields are marked *