EportFolio Entry #1
Why are you interested in cybersecurity technology?
I first became interested in cybersecurity at a very young age. I remember being really young and in middle school and receiving my first game console for christmas. It was an exciting and expereience I took it out of its stiff package and setup. Once connected to the internet I tried to access sony’s online servers to play with my friends but I receieved an error alert that I could not be connected. After Recieving this error I went to the internet to search and I found out that sony had been hacked. I was amazed and decided to learn more about computers. From there I watched tons of linus tech tips videos they Often made videos building computers out of scrapes. Once old enough I decided to buy pc parts and build my own pc it was a great learning experience. When thinking about my career I was choosing between computer science and cybersecurity. Their were many pros and cons to each but the one that stood out to me that most was the ability to work closely with a team to secure an mission critical environment. I didn’t just want to code websites or random apps I wanted to be able to protect the nation from the various cyber threats their are today. Because we utilize technology more and more in our daily lives, cybersecurity is more important than ever. Cyberattacks are growing more common, smart, and varied, and they may seriously harm people, businesses, and even entire countries. Once in college I obtained multiple internships in the first semester, The first one was as a Networking and iot applications student worker where I helped maintain campus security cameras, PKI scanners, and MFP’s. I provided support to faculty and staff using service now and pinnacle. Following this I added another internship as a Cybersecurity policy/audit intern where I developed SOP’s media protection and malware prevention to help LightGrid obtain their level 1 CMMC. About two months ago I added my last internship as a cybersecurity specialist where I had a deep dive into cybersecurity acting as a security engineer for the company. I’ve recently also recently obtained my security+ certification.
Eportfoli Entry #2
Select four other majors offered by ODU and explain how those majors relate to cybersecurity.
Computer engineering, English, cybercrime, and business administration are all important disciplines that can contribute to the field of cybersecurity in different ways. First and foremost, computer engineering offers the technical expertise required to develop and execute secure systems. Hardware and software solutions may be created by computer experts that include security safeguards like firewalls, access restrictions, and encryption. They can create security standards for databases and networks. Their knowledge of computer architecture and programming is essential for creating and executing efficient cybersecurity solutions. Second, because English is the language of communication in the international world, it is crucial to cybersecurity. Communication is crucial to cybersecurity because it permits the exchange of knowledge and information about online dangers and how to defend against them. For cybersecurity professionals to effectively connect with coworkers, clients, and stakeholders throughout the world, they must be fluent in English. Additionally, programs that teach employees about cybersecurity hazards and safe online conduct need to have participants with strong communication skills. Thirdly, cybersecurity research focuses heavily on cybercrime. Cybersecurity experts can better grasp the strategies and motives of hackers and cybercriminals with knowledge of criminality. This knowledge is crucial for creating tactics that will effectively stop, identify, and react to cyberattacks. Students who take cybercrime courses also learn about the ethical and legal ramifications of cybersecurity, which is crucial for risk management and compliance. Finally, business administration equips students with the abilities and knowledge necessary to successfully manage cybersecurity teams and initiatives. Business administration elements like risk management, project management, and strategic planning are essential in creating and putting into practice cybersecurity policies and strategies since cybersecurity is increasingly becoming a business concern. Business administration classes also educate students on the operational and financial effects of cybersecurity, which are crucial for planning budgets and allocating resources. In conclusion, computer engineering, English, cybercrime, and business administration are all important disciplines that can contribute to the field of cybersecurity in different ways.
Eportfoli Entry #3
Describe four ethical issues that arise when storing electronic information about individuals.
There are multiple ethical questions raised by electronic information storage. When keeping electronic information about people, four major ethical questions come up: prejudice and discrimination, accuracy and completeness, data ownership and control, and privacy and secrecy. A basic ethical problem in regard to the preservation of electronic information is privacy and secrecy. People have a right to be in control of and aware of who has access to their personal information. To avoid privacy and confidentiality violations, the information must be secured and shielded from unwanted access. Such violations may result in serious consequences, including discrimination or identity theft, as well as harm to people’s reputations. Another moral concern that has to be addressed is the quality and completeness of information that is kept electronically. Individuals may suffer negative effects if judgments concerning them are made based on inaccurate or inadequate facts. Therefore, it is crucial to make sure that electronic information is accurate, current, and simple for the person whose information is kept to access. When storing electronic information, it is necessary to address ethical issues related to data ownership and control. People have a right to be in control of their own data and to know who is able to access it. But it’s possible for third parties to gather and use data without people’ knowledge or consent, necessitating the need to safeguard the ownership and management of personal data. The possibility of prejudice and discrimination is a serious ethical issue associated with the preservation of electronic data. Electronic data may be used to determine a person’s eligibility for credit or employment, among other things. Biased or prejudiced data may result in unfair consequences for some people. In order to ensure that judgments are based on factual criteria rather than subjective preferences, it is crucial to gather and use data in a fair and unbiased manner. In conclusion, ethical issues surrounding the preservation of electronic information must be addressed, with careful attention given to discrimination, privacy, accuracy, and data ownership. Individuals can be protected from damage and given control over their data through the ethical and responsible management of electronic data.
Eportfolio entry #4
Compare cybersecurity risks in the U.S. and another country.
It is difficult and nuanced to compare cybersecurity risk between the US and China. Both nations have distinct strategies for tackling these hazards despite the fact that they both confront particular difficulties and dangers.
Although the US is regarded as a global leader in cybersecurity, it nevertheless confronts formidable obstacles. State-sponsored assaults from nations like China, Russia, and North Korea are one of the largest dangers to US cybersecurity. These assaults target vital infrastructure, governmental institutions, and commercial entities, and they frequently have as their objectives the theft of confidential data, operation disruption, or property destruction. Protecting the personal information of its residents presents considerable issues for the US as well, especially in light of the expansion of social media and other online platforms. China, on the other hand, is renowned for its formidable cyber capabilities, which include a sizable and well developed infrastructure for state-sponsored hacking. The Chinese government has been charged with cyberspionage and stealing intellectual property from US businesses and government institutions. As the nation quickly digitizes and the government’s involvement in policing individuals’ online behavior expands, China also confronts substantial hurdles in securing the personal data of its residents. The two nations’ approaches to cybersecurity are one area where they diverge greatly. In the US, the private sector is generally in charge of cybersecurity, with help and direction coming from government organizations. The US government has also put in place a number of laws and rules to safeguard sensitive data and key infrastructure. In China, however, cybersecurity management is handled considerably more effectively by the government. The government has put in place a number of laws and rules that enable it to keep an eye on individuals’ internet activities and impose access restrictions on particular websites and services. Overall, there are considerable cybersecurity dangers for both the US and China, and each country has various strengths and limitations in tackling these issues. Both nations must continue to make investments in cybersecurity and collaborate to combat shared risks as the world becomes more digital and linked.
Eportfolio #5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.
C – Create and sell APT threat reports.
Y – Yield management services for cloud-based platforms.
B – Bug bounty programs, which reward individuals for finding vulnerabilities in software or websites.
E – Encryption software or services.
R – Remote access tools or software.
S – Security consulting services.
E – Email security solutions, such as anti-phishing or spam filtering.
C – Cloud security solutions or services.
U – User behavior analytics tools or software.
R – Risk assessment services.
I – Identity and access management solutions or services.
T – Threat intelligence services.
Y – YouTube channel focused on cybersecurity education or news.
Eportfolio #6
How has cyber technology created opportunities for workplace deviance?
Workplace deviance, which is defined as any employee breach of organizational norms or standards that might affect the organization or its members, has increased significantly as a result of cyber technology. With the growing use of computers, the internet, and other technical improvements at work, employees now have fresh opportunities to participate in improper conduct that might be detrimental to their employers and coworkers. Social networking sites are one way that cyber technology has enabled workplace misbehavior. Social media may be used by staff members to participate in online bullying, propagate rumors, and publish offensive remarks or images that could damage the company’s brand or the reputation of other staff members. Additionally, they could divulge private corporate data on social media, such financial reports or client information, endangering the security and standing of the company. Electronic communication, including email and instant messaging, is another way that cyber technology has encouraged workplace deviance. These channels can be used by staff members to communicate inappropriately or offensively, including via harassment and discrimination. Additionally, they might utilize these channels to disseminate rumors and gossip that could damage the company’s brand and foster a hostile work environment. The use of cyber technology in the workplace has also increased potential for fraud and theft. Employees, for instance, are capable of accessing and stealing private data, including trade secrets and intellectual property, using business computers. Additionally, they have the ability to manufacture fake papers or make personal copies of sensitive corporate data using company equipment like printers and copiers. Last but not least, cyber technology has given workers the chance to commit time theft, in which they squander corporate time and resources by using the internet for personal purposes while at work. This can involve engaging in activities that decrease productivity and profitability, such as social media surfing, online shopping, or playing games. In conclusion, enterprises must develop policies and processes to reduce these risks as a result of the multiple opportunities that cyber technology has given rise to. Employers must develop repercussions for individuals who breach these rules and offer staff with clear instructions on what constitutes acceptable behavior. Organizations should also invest in cybersecurity solutions to safeguard sensitive corporate data and guard against online threats. By implementing these actions, businesses may lessen the dangers posed by cyber technology while improving the environment for effective work.
Eportfolio #7
What are the costs and benefits of developing cybersecurity programs in business?
In the current digital era, creating cybersecurity plans for businesses is a crucial problem. Businesses must evaluate the costs and advantages of creating cybersecurity strategies to decide whether they are worth the investment as cyber threats continue to increase in frequency and complexity. Creating an extensive cybersecurity program may be expensive, both financially and in terms of manpower and time. Businesses must spend money on the hardware, software, and technology required to safeguard their networks and data against online attacks. In order to manage their cybersecurity initiatives, they must also make investments in qualified individuals. They must also offer training and retain seasoned professionals to sustain the program. It might take a while to create a cybersecurity program since companies have to do risk assessments, put security measures in place, and often upgrade them. Despite these expenses, businesses may gain greatly from implementing cybersecurity strategies. The main advantage is that it may shield firms against online dangers including ransomware assaults, spyware, and data breaches. Businesses can stop hackers from stealing important data or interfering with their operations by putting in place strong security measures. By showing stakeholders and consumers that a company takes data protection and privacy seriously, establishing a cybersecurity program may also help a company’s reputation. This can foster trust and create a favorable brand perception. Creating a cybersecurity program may also assist firms in adhering to data protection and cybersecurity laws. These rules apply to a wide range of sectors, and compliance can help organizations avoid steep penalties and other repercussions. In conclusion, it is important to thoroughly weigh the advantages and disadvantages of creating cybersecurity programs for businesses before making a choice. Even while creating such programs entails high costs, the advantages in terms of defending against cyber attacks, improving reputation, compliance, increased productivity, and competitive advantage often outweigh the expenses. Therefore, to safeguard their assets, uphold their brand, and stay competitive in the modern digital environment, businesses must invest in cybersecurity initiatives.
Eportfolio #8
How can you tell if your computer is safe?
A computer’s safety and security must be ensured, especially in the current digital era where cyber dangers are growing more advanced. People may use a variety of signs to assess if their computer is secure from online dangers. The existence of up-to-date security software is one of the first signs of a secure computer. To protect themselves from the most recent dangers, people must make sure they have credible antivirus and anti-malware software installed and that it is frequently updated. In order to prevent unwanted access to the computer, it is also crucial to make sure that the firewall is on. The firewall serves as a barrier between the computer and the internet. The routine installation of software patches and updates is another sign of a secure computer. The danger of cyberattacks is decreased since these updates frequently include security patches that address known vulnerabilities. Additionally, people must make sure that automatic updates are set so that their computer will automatically download the most recent security updates without their action. Strong passwords and two-factor authentication must both be configured on a secure computer. A strong password should have at least eight characters, be difficult to guess, and contain a mixture of capital and lowercase letters, numbers, and symbols. By asking users to give a second form of verification, such a fingerprint or a code delivered to their phone, to access their accounts, two-factor authentication adds an extra layer of protection. Finally, people should use caution when downloading data or accessing the internet. Unsafe websites or harmful links have the potential to steal personal data or infect a machine with malware. People must thus only go to reliable websites, refrain from clicking on dubious links, and only download things from reliable sources. In conclusion, there are a number of signs that might assist people in figuring out whether their computer is secure.
Eportfolio #9
Describe three ways that computers have made the world safer and less safe.
Computers have had a significant impact on our lives, both positively and negatively. The safety of transportation has significantly increased thanks to computers. Modern vehicles come with a variety of sensors and computers that can recognize and react to dangers like slick roads or people. Driving is now safer because to this technology, which has decreased the frequency of incidents on the highways. Because computers allow for the collection and analysis of enormous volumes of data, they have significantly improved national security. Computers are used by intelligence services to track prospective threats and spot patterns of behavior that could point to terrorism or criminal activity. The use of this technology has contributed to assault avoidance and public safety. Computers have transformed emergency services’ ability to respond to disasters by allowing them to do so more rapidly and efficiently. Real-time information regarding the location and severity of a catastrophe may be provided through satellite images, social media, and other technologies, enabling emergency services to plan and carry out an efficient response. While computers have improved society theree has been many negative impacts as well. Cybercrime has been made possible by computers, which has decreased global safety. Criminals can steal personal information, perpetrate fraud, and launch cyberattacks using computers and the internet. Significant financial losses and reputational harm have resulted from this.The ease with which information can be shared online and through computers has facilitated the spread of false information. Serious repercussions may result from this, including societal discontent, a decline in faith in institutions, and even acts of violence. Lastly, cyberwarfare is a brand-new area of conflict made possible by computers. Computers may be used by nation-states and other entities to launch assaults on vital infrastructure, such power grids and banking systems. Devastating effects, such as economic upheaval and fatalities, may result from this.
Eportfolio #10
How do engineers make cyber networks safer?
Cyber networks play a crucial role in how today’s governments, corporations, and people operate. The likelihood of cyberattacks rises as the use of these networks expands. Cyberattacks can result in significant consequences including data theft, financial loss, and reputational harm to a business. Engineers are essential in creating and implementing security solutions that make cyber networks safer in order to reduce these dangers. Finding possible weaknesses is the first step in securing cyber networks. To find network vulnerabilities, engineers employ a variety of approaches including vulnerability scanning and penetration testing. Engineers may start working on putting security measures in place to defend against attacks once these vulnerabilities have been found. Firewalls, intrusion detection systems, and encryption are some of these safeguards. In order to stop illegal access to a network, firewalls are crucial. Between the network and the internet, they serve as a barrier, screening out unauthorized activity and allowing only permitted traffic to flow through. The goal of intrusion detection systems (IDS) is to identify any attempts at illegal access and notify the network administrators. Additionally, IDS may be set up to automatically filter out questionable traffic. Engineers utilize encryption as a key security tool to safeguard sensitive data. Data is encrypted using sophisticated algorithms to create a format that cannot be read without the right decryption key. Attackers will find it more challenging to steal or alter data as a result. Engineers are crucial in teaching network users on security best practices in addition to these security measures. This involves educating users on the use of secure passwords, avoiding phishing scams, and updating software. To guarantee that only authorized users have access to sensitive data, engineers can also add policies like multi-factor authentication and access controls. The network must also be periodically checked by engineers for any suspicious activities. To do this, logs and network traffic must be examined for any odd patterns that would point to an assault. Engineers can immediately respond to any security events and stop them from inflicting significant harm by monitoring the network.
Eportfolio #11
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
Given that cybercrime is a major source of worry for law enforcement organizations across the world, there is a substantial overlap between criminal justice and cybercrime. Using technology to perform crimes including hacking, identity theft, online fraud, and cyberstalking is known as cybercrime. These crimes need specific training and information, and the criminal justice system is in charge of looking into and prosecuting them. The investigation of these offenses is one of the main areas where criminal justice and cybercrime intersect. In order to investigate and obtain evidence relating to cybercrime, law enforcement authorities must possess the requisite technological skills. Data recovery, network analysis, and computer forensics understanding are all included in this. Professionals in criminal justice must be able to recognize digital evidence, examine it, and utilize it to compile a case against the offender. In addition, there is a connection between criminal justice and cybercrime and the other topics covered in this course, including computer science, cybersecurity, and information technology. In the struggle against cybercrime, each of these domains is essential. In order to comprehend how cybercrime is perpetrated, a basic grasp of computer systems and networks is provided by computer science. Additionally, there is a connection between criminal justice and cybercrime in areas like policy and law. The creation of rules and regulations that successfully combat cybercrime requires collaboration between the criminal justice system and decision-makers. These laws cover digital forensics, cybersecurity, and data privacy legislation. To guarantee that their investigations and prosecutions comply with legal standards, criminal justice professionals must also remain current on the most recent legislative changes relating to cybercrime.
Eportfolio #12
How does cyber technology impact interactions between offenders and victims?
Cyber technology has significantly changed how criminals and victims communicate. Due to the growth of the internet and social media, criminals now have additional ways to approach and target potential victims, frequently secretly and remotely. A new kind of victimization that is distinct from typical criminal activity has resulted from this. Cyber technology has changed how criminals and victims connect by introducing a new kind of communication platform. Criminals can contact potential victims using social media, messaging services, and other online forums while frequently impersonating someone else to win their confidence. Cyber technology has also made it easier for new criminal behaviors to emerge, such cyberstalking and revenge porn. Technology is frequently used in these crimes to harass and intimidate victims, thereby upsetting them emotionally. The anonymity offered by technology allows offenders to continue their abuse without worrying about getting detected. Cyber technology has also changed how criminals and victims interact by making it simpler to perpetrate financial crimes like identity theft and online fraud. Technology enables criminals to get victim’s personal information, including credit card and social security numbers, which they may use to make illicit transactions or take money out of their accounts. In terms of reporting and asking for assistance, cyber technology has also influenced relationships between offenders and victims. Cybercrime victims may be reluctant to disclose the crime out of fear of revenge or worries about the protection of their personal information. Additionally, victims may find it challenging to ask for assistance or support from others due to the anonymity of online contacts. In conclusion, the interactions between criminals and victims have been significantly impacted by cyber technology. It has encouraged new criminal activity, produced new communication channels, and made it simpler to perpetrate financial crimes. Law enforcement organizations and legislators must keep up with the most recent advances as technology develops and adjust their responses to address new types of victimization.