Journal Entry #12

Journal Entry #12

There has been an increase in internet crime within the U.S. The consequences of a cyberattack can include financial losses, theft of property, and loss of consumer confidence and trust. The monetary impact has been estimated to be billions of dollars a year. With the foremost common sorts of cybercrime being phishing and fraud, there has been and continues to be an overload of victims. Victims of these cases can feel violated love it may be a physical attack. Many victims reported psychological impacts like anger, anxiety, fear, isolation, and embarrassment. Many of those crimes go unsolved leaving victims with no justice. Victims will always be present as long as people continue taking risky actions when using the web. People need to be more aware before opening random links, sharing password information, and/or using unsecured Wi-Fi connections. most of the people who engage in these actions find themselves with a negative consequence. Offenders on the opposite hand are trying to find opportunities to hunt out vulnerable pathways to access a victim’s personal data and bank information. It’s believed that victims and offenders share risk factors like low self-control, routine activities or a risky life-style and socio-demographics that increase both their risk for offending and victimization. In other words, victims are easy targets when they don’t use secured methods when accessing the internet. Making accounts using an equivalent weak password could put you on the radar to be a victim. In return, a victim could decide become the offender if they plan to engage within the cybercrime activity that was inflicted upon them. Because there are challenges policing the web an individual may feel there’s a decreased chance of getting caught. Additionally, offending can directly cause victimization or the other way around.

Journal Entry #3

Four ethical issues that arise when storing electronic information about individuals are privacy and confidentiality, security breaches, system implementation, and data inaccuracies.  Privacy and confidentiality can be used interchangeably.  However, privacy means the state or condition of being free from being observed or disturbed by other people.  Confidentiality means the state of keeping or being kept secret or private.  The importance of confidentiality is that it helps to build and develop trust.  Privacy eliminates judgement and gives control when making decisions.  Electronic information must be kept confidential to prevent theft and compromise of systems.  Lack of privacy and confidential could damage the reputation of an organization and lead to legal consequences. Another ethical issue is security breaches.  A data breach exposes sensitive or protected information to an unauthorized person.  The files in a data breach are shared without permission.  System administrators should pay attention to detail and use security protections in order to avoid a massive data breach.  It’s a known fact that hackers have many ways to get through the internet or online services that we use.   A third ethical issue is system implementation.  System implementation refers to how the system is designed and works.  In addition, implementation is the carrying out a plan or method for doing something.  This is important because if successful, it improves an organization ability to improve and provide a service.  If implementation is not successful it may be difficult to reach goals.  Lastly, data inaccuracies are an ethical issue.  Data inaccuracy occurs when information has not been entered correctly or maintained.  A company needs to be able to maintain reliable information. This is important to build and maintain trust with a company. If information is incorrect it can interfere with daily processes and operations.  Overall, avoiding any of these ethical issues will prevent any harm to individuals.

Journal Entry #10

Cybersecurity engineers have a significant job outlook.  More and more companies are becoming more reliant on technology therefore, more cybersecurity engineers will be needed to secure their systems. Cybersecurity Engineers are responsible for protecting the networks and systems of an organization against threats from criminals in cyberspace.  Their job duties include performing assessments and penetration testing along with the development and implementation of secure network solutions. Cybersecurity engineers must be able to troubleshoot, identify unauthorized access, and offer solutions regarding an organization’s system and network as it relates to the field.  In addition, a person with this title will be responsible for collaborating with other departments to establish security protocols and protect IT systems. Cybersecurity engineers work hard to keep networks safe but it does not come without a challenge. One challenge is engineering more secure software.  One way to address this may be through updated to better programming languages that have security protection embedded into the ways the programs are written.  Also, cutting-edge technology is needed to identify weak features before the software is completely installed. Another challenge is safeguarding data flowing over various routes on the internet so that the information cannot be exploited. Currently, data traffic can be vulnerable to all kinds of cyber-attacks. All cybersecurity engineers have to use their expertise to monitor and secure potential threats.  They must be able to pay attention to detail and quickly detect compromises to an operating system.  They are acting as forensic agents while they are attempting to catch cybercriminals.  These engineers have to understand the safety of the whole system not just individual parts in order to protect networks. Much work goes into accomplishing the complex task of protecting cyberspace from attack. All and all, the war cybercrime remains to be fought electronically by individuals devoted to keeping computer networks operable and safe.

Journal #9

Over the years, computers have made the world safer and less safe. Life is easier and safer with biometric password options, notification alerts, and location tracking. On the other hand, the world is less safe due to cyber threats. These days, a device may be hard to hack if the owner selects certain password options. A person can protect their devices using face recognition, fingerprint, or even a pattern. Face and fingerprint authentication allow users to scan in order to access a device or workstation. In addition, faster access can be given with biometric identification because it is highly accurate and almost impossible to duplicate. With this technology, there is no need to remember strong passwords and it increases overall security.  There are many types of alerts that make the world safer. Alerts are notifications used to inform the user about an event or to encourage them to take action. There are emergency alerts that inform the general public about weather warnings, missing children, and vaccination locations. In addition, a person can receive bank alerts for various transactions. Customers can choose to get alerts when they receive a deposit or experience suspicious activity on their account. Lastly, security alerts are used to inform subscribers of breaches on property. Real-time alerts can be effective for reducing crime. The use of GPS tracking has also improved safety in the world. Tracking devices are used to monitor vehicles, the movement of people, and assets. This technology allows users to provide safety and protect what is most important to them by accessing features such as real-time tracking, route history, geographical areas (geofence zones), and event alerts. On the other hand, there are three ways computers have made the world unsafe. Today, cyberbullying, online fraud, and identity theft are prevalent dangers. Users have access to online social media which is generally used to be a platform for making positive connections but, it can also be used to send messages to intimidate and threaten others. In addition, fraud such as email scamming seems to lure people into sharing personal information in exchange for prizes and/or fake money payouts. Lastly, identity theft cases have doubled. Criminals have shifty ways of hacking consumers’ personal information and using it for personal gain. The best way to combat cyber threats is to get protection and put to use universal cyber safeguards when accessing the web.

ReplyForward

Journal Entry #8

There are always potential cyber threats such as hackers, snoopers, viruses, and phishing attacks in the making. However, there are ways you can make sure your computer is safe. Privacy and security are top priorities when using a computer. Although new computers usually come with the latest software to secure data there are ways you can tell if your device is secured.
First, go to your settings and examine your passwords to see if they are strong and unique. If your passwords are weak reset your password or use suggestions from your computer. There are free online tools and websites that allow you to complete a strength test and create a stronger password. You can even use internet websites to see if your password has been leaked during a data breach. Having a strong password will defend against unauthorized access to your computer and personal information. Secondly, test your firewall. A firewall keeps hackers from seeing your computer online. Use trustworthy hardware to scan your firewall to make sure your computer is invisible. Without firewall protection, your computer is vulnerable because there may be thousands of ports open and available to unwanted viruses and cyber crooks. Next, delete all files that were moved to your trash, permanently. Just deleting files does not protect you. Someone could retrieve the files if they are lingering. There are many data recovery programs that can easily access the deleted data from the hard drive and that’s why it’s important to erase the data permanently. Steps to successful deletion can be found online or in your computer search log. Finally, check your privacy settings on social media. Make sure you understand the privacy details on those sites. This will ensure that your information is not available for outsiders to view. Information can be filtered not to let others know any more than you want to tell them. Privacy settings should be checked regularly to safeguard your personal information.

Journal Entry #6

Workplace deviance is defined as a deliberate plan to sabotage a corporation by causing problems within.  Today, crime can occur in an informal way with the use of a computer.  Tech-savvy criminals are able to unlawfully acquire information online with the push of a button.  Day by day these harmful acts have become easier with the use of cyber technology. High-tech criminals use malware tools to set up their attacks. Malware, or malicious software, infiltrates and gains control over a computer system or a mobile device to steal treasured information or damage data. Because of advancements in technology, criminals can use the advantage of accessing information from several places while sitting in the comfort of their cubicle or home office.  This makes it much harder to find the person while in the act.   An example of workplace deviance is when an angry employee gives confidential data away in exchange for monetary gain.  This behavior is the opposite of workplace expectations.  Another example of deviance is when an employee knowingly leaves the company security system unlocked and at risk for attack.   This would leave the company open to potential threats and security breaches.  Having communication between employer and employees, strategic hiring selection, and training are ways to reduce workplace deviance. Requiring employees to work in pairs and installing camera systems that monitor activity can be helpful as well.  Overall, most companies conduct background checks, but there is always the potential for sabotage.  In addition, there are minimal to no laws to address many of these behaviors. The FBI has specially trained cyber squads across the country in each of their field offices, working hand-in-hand with interagency task force partners. The rapid-response Cyber Action Team can position across the United States within hours to respond to major incidents.  The war continues against cybercrime and as a result, organizations spend billions of dollars to defend themselves from cyber attacks that can occur outside and from within.  

Journal Entry #5

C-Career as a cybersecurity sales engineer that promotes sales

Y- You should plug into Poly Swarm to build threat detection skills 

B- Become a bug bounty hunter

E- Engage in cyber communities such as Hacker One to network and find opportunities

R- Receive new certifications

S- Situational awareness job

E- Experience with knowing how to manage operating systems and network security

C- Collection of data logs and build data analysis skills

U-Understand cyber architecture and controls

R- Risk management job

I-Intrusion detection job

T-Toolkit management job

Y- You should learn new technologies and multiple scripting languages

Journal Entry #4

America and China are highly hooked to the web and thus greatly exposed to cyber-attacks. Most of the attacks are for the aim of cyber espionage, but this risk is real and to not be underestimated. In 2019, the U.S. was ranked fifth most secure, behind Japan, France, Canada, and Denmark. Malicious hacking from domestic or foreign enemies remains a continuing threat to the U.S. and other countries alike.
Cyberwarfare is that the use of technology to disrupt the activities of a state or organization, especially the deliberate attacking of data systems for strategic or military purposes. A cyber-attack is an act of war. Our country suffers from China’s constant attempts to penetrate cyber information. Every data source in our is vulnerable including military, technology, and media. The Chinese operate using mischievous techniques and code that are comprised in several attacks at an equivalent time. The Chinese operate with strict control over access to web-led security experts. it’s been confirmed by intelligence agents that the Chinese army has hackers in their army that are trained for cyber operations. This group is understood as the “cyber blue team.” The team was launched to guard their country against cyber-attacks. On the opposite hand, the U.S. is dedicated to great attention to cyberspace, and therefore the government is aware that cyber threats and their effects. The U.S. Cyber Command centralizes command of cyberspace operations, organizes existing cyber resources, and synchronizes defense of U.S. military networks. It is a soldier’s Unified Combatant Command.
Exactly because the US, China have established various cyber units located across the country that monitors the digital worlds and potential threats. These cyber-attacks will continue as China tries to realize the whip hand within the cyber world. It’s believed that China’s mission is to inhibit an adversary’s ability to conduct military operations against its country. Additionally, they desire to access tips so as to focus on the enemy’s command, control, and communications. As a result of those growing threats, the U.S. has developed significant cyber capabilities.

Journal Entry #2

Four majors that relate to Cybersecurity, that Old Dominion University provides, is Cybercrime, Information Systems & Technology, Computer Engineering, and Computer Science. Cybercrime has relation to Cybersecurity because both are computer-oriented, and both deal with the nation’s security, company, etc. Cybercrime is “criminal activities carried out by means of computers or the internet.” These specialists have to deal with criminal activity that targets computer networks or networked devices. Cybersecurity specialists have to deal with the same problems, and both have the same Framework to go by. Secondly, Information Systems & Technology is “the study, design, implementation, support or management of computer-based information systems.” This major manage technology and help users make the most of its functionality. These specialists make sure to protect organizations ability to function, safe operation of applications implemented on organization’s IT system, protect data the organization use and collect, and safeguard the technology assets. In relation to Cybersecurity, they both consists largely defensive methods used to detect intruders. They both used the Framework policy to go by and study. Thirdly, Computer Engineering is a “branch of engineering that integrates several fields of computer science and electronic engineering required to develop computer hardware and software.” Computer Engineering and Cybersecurity both deal with policy, forensics, and management. ‘Their work is the link between scientific discoveries and the commercial applications that meet societal and consumer needs.” Lastly, Computer Science is “the study of computers and computing as well as their theoretical and practical applications.” Computer Science also deals with algorithm formulation, software and hardware development, and artificial intelligence. “Computer Science is the study of phenomena related to computers.” “Cybersecurity is a phenomenon related to computers.” Overall, Cybersecurity is the main base for these four majors and many more. With Cybersecurity being the main function, “it encompasses everything that pertains to protecting our sensitive data.”

Journal Entry #1

My field of study is Cybersecurity. Cybersecurity is the body of technologies designed to protect networks, data, and computer programs. Cybersecurity is a defense medium that works in response to tampered operating systems. With the help of the different technologies, Cybersecurity Analysis and IT’s help prevent data from being attacked or damaged by unauthorized personnel. Cybersecurity offers system and software protection through penetration tests and vulnerability identification. Cybersecurity is important because it helps prevent intruders from hacking and getting personal information from our computers. The pros of having Cybersecurity are your computer will be protected from data theft, viruses, spyware, and freezing and crashes. The cons of Cybersecurity are it may be harder to configure Firewalls correctly, the need of keeping your software updated, and it could be costly for the user to keep up to date.  Technology is being used for everything we do throughout our everyday lives. That being so, technology is starting to grow stronger and better throughout the World. Hackers are always using different methods to steal unauthorized information from people and companies by cyber attacking. For example, a black hat hacker is someone who intentionally tries to destroy files and steal credit card numbers and passwords. These hackers go in without authorized permission and exploit programs for their malice or personal profit. White hat hackers are another example of hackers. Their goal is to find holes in security networks while working along with businesses. These hackers try to look for vulnerabilities by having complete permission from the company they work for. The need for Cybersecurity workers is in high demand, thus making my major a prime area of study. Overall, my major addresses the dangers/concerns associated with technological frailties and what solutions there are in order to counter them. It is super important for people within my major to understand cyberattacks and help prevent them.