Soft Skills
Public Speaking
This course is designed to introduce students
to the basic elements of communication, to provide practical experience in the
preparation and presentation of speeches, and to improve listening skills.
The goal of this course is to improve organizational and verbal weaknesses and
to strengthen any present communication talents, while also developing an air
of confidence while speaking.
Computer Literacy: Communication and Information
A guided review of communication technology and information sources to help students
discern between reliable and unreliable sources and techniques. Students develop skills in
computer applications, information retrieval, filtering and analyzing data, and formatting and
presenting information.
Hard Skills
Microsoft Technologies
In CYSE 280 – Windows Systems Management and Security, the course introduces tools and techniques used to configure, manage and implement Windows and its security-related features. In this specific assignment networking fundamentals, Windows administration tools, and cybersecurity history.
1. One main main characteristics of a network operating system would be the Users interface under administrative. Under Administrative you are able to manage and control a system using command lines. Another characteristic would be Data backup. Incase if Disasters you have that recovery in the system.
2. In my opinion for huge company that needs network DHCP is the best with it being compatible with large amount of IP address availability and complicity. It would also be a plus for admin accessibility with moderation.
With APIPA this configuration is beneficial for smaller businesses and an A1 backup system. Being that a DHCP server goes unavailable APIPA will assign itself an IP address. They do have a range of the IP address and they are not the best with admin administration.
3. The main differences with a Powershell Variable and a Constant would be a variable main focus is to storage data and during that time in storage it is subjected to change from the execution of a script, it is also best used to hold temporary data. With Constant the variable cannot change during a script, best used if you want a script to remain constant.
4. SFC is a tool that checks a file to make sure nothing is tampered with or missing using the original copy while FSV scans to make sure the file is verified with a signature. These two together is a powerful duo with sending or viewing files for accuracy and integrity with everything being original and true.
5. The significants of this catalog that was leaked were the types of materials the NSA created for certain missions such as hacking, cyber surveillance and exploits. These materials that can be used caused curiosity with the public with the impacts this had. One device called the RageMaster that taps in someone VGA port and can clone a person monitor letting you see everything they’re doing with a certain amount of distance.
6. In August 2016 the tweet that was sent out giving the public free access of TAO tools had caused a scare for the cybersecurity community, it also had others thinking how many other secret exploits Shadow Breakers have.
7. Their responce was bringing awareness the public about patches and and updates. They weren’t sure if the Shadow Brokers had more secret explorations or how they had access.
Linux Operating Systems
This course introduces the basic operations in major Linux distros for cybersecurity using both
graphical interface and command-line interface. Students will learn about the basic installation
and configuration, file systems management, shell scripts, and user authentication in Linux
systems. The lab below shows the skill of Critical Thinking & File Permissions.
Cybersecurity Techniques and Operations
This course focuses on tools and techniques involved in real-world cyber operations. It provides a
broad range of cybersecurity concepts and essential hands-on training for students who want to
become cybersecurity professionals. Students will learn the basic cybersecurity discipline, underline
the model computing environment, and practice different tools and strategies to perform cyber
attacks and defense operations.
- Practical networking
- Troubleshooting
- Cybersecurity analysis
- Protocol behavior
- Performance monitoring
- Real-world traffic interpretation
These are core skills for network administrators, cybersecurity analysts, and IT professionals
Cybersecurity Strategy and Policy
This course explores cybersecurity policy and strategy and introduces students to the essentials of strategy development and policy making in cybersecurity. Topics considered include planning principles in cyber strategy; risk management and cybersecurity policy; the connections between cybersecurity policies, businesses, and governmental institutions; the knowledge, skills, and abilities needed to develop and implement cybersecurity policy; the social, political and ethical implications that arise in cybersecurity policies and strategies; strategies to assess cybersecurity policy; and the ties between national security and cybersecurity policy.
The National Cybersecurity Strategy May 2024 (Version 2) outlines a clear and coordinated plan to address cybersecurity threats in the United States. The strategy focuses on shifting the responsibility of cybersecurity from individuals, small businesses, and local governments to larger organizations better equipped to manage risks.
The goal is to secure America’s digital infrastructure, protect investments in rebuilding national infrastructure, and strengthen the technology and manufacturing sectors.
For this assignment, a skill I learned fall into Policy literacy & Cyber Awareness.
Interdisciplinary Research Process and Theory
IDS300W is a writing-intensive course that critically examines issues related to interdisciplinary perspectives, including the study of differences and similarities among academic disciplines. This includes the application of an interdisciplinary approach to a specific topic of study. In this assignmnet I learned the skill of Interdisciplinary study in Cybersecurity.
Analyze existing criminological theories in the context of cyber offenses. How well do these theories explain cybercriminal behavior, and are there unique factors to consider?
Jade Ames Moore
Old Dominion University
IDS 300W: Interdisciplinary Theory and Concepts
Dr. Patricia Oliver
April 2, 2024
Abstract
In this research paper I was challenged to strengthen my ability to seek and gain Interdisciplinary concepts. Coming into the interdisciplinary studies, I lacked the meaning and objective of these studies. Coming into this course I knew the bare minimum that interdisciplinary is bringing two or more studies together as one, such as Criminology and Cyber Security for an example. With these two courses separate with criminology you see why humans do crimes with what, when, why ,who, how. In cybersecurity you are defending and going against these humans in question that feel obligated to do a crime. With those two majors together you have the interdisciplinary on how people can be psychologically impaired to doing cybercrime.
For my research paper I analyze existing criminological theories in the context of cyber offenses and how well do these theories explain cybercriminal behavior, and are there unique factors to consider? I am about this with comparing an interdisciplinary to one of the criminology theories and contrasting on how they compare.
Keywords: Cybersecurity, Criminology, Psychology, Law, Cybercrime, Theories.
How do Criminology theories explain Cyber Criminals behaviors ?
With technology taking over this current generation and the increase of threats, we need awareness of the human factor in cybersecurity. My problem is complex because the human factors in cybersecurity are actions or events that result in a data breach. These factors largely result from a lack of awareness, negligence, or inappropriate access control. The important insight in the human factor of cybersecurity and Important disciplinary insights on my topic include Cybercrime, Psychology, and CyberLaw.
Theories of criminology and cybersecurity are intimately related because knowledge of the dynamics, motivations, and behaviors that underlie cybercrime informs cybersecurity initiatives. Although criminological theories like routine activity theory, strain theory, and others have been used to describe cyber offenses, they might need to be modified or integrated with fresh viewpoints in order to completely explain the behavior of cybercriminals.
Cybercrime Theory
Cybercrime refers to criminal activities that involve the use of computers, computer networks, or networked devices. These illicit actions can be committed by cybercriminals or hackers with various motivations. With these various motivations comes the Strain theory and why these criminals take these actions into consideration. Cybercrime can be looked under and identified as email and intent fraud, identity frauds, theft of financials, ransomware, illegal gambling and more. When it comes to the Strain theory and Cybercrime, their act comes when they are stressed and financially need a release. They do these crimes to “get back” on their feet for financial gain. In the context of cybercrime, strain theory can be applied to explain how individuals facing economic hardships or societal pressures may turn to cyber offenses as a means of achieving financial gain or status. “In an effort to build our understanding about cybercrime within a criminological framework, in this study we use labeling theory as a guide to examine the patterns, characteristics, and sanctions associated with a sample of cybercrimes with an aim towards identifying how these offenses are socially constructed in comparison to traditional crimes, white-collar crimes, and international crimes”(Payne, Hawkins, Xin, 2018, pg. 1).
Psychology Theory
Professionals in cybersecurity can better grasp how people use technology and perceive cybersecurity threats by using psychology. Psychologists can discover frequent mistakes that result in security breaches, such as falling for phishing scams, using weak passwords, or forgetting to update software, by observing user behavior, attitudes, and decision-making processes. Programs to raise user knowledge of cybersecurity and encourage safer online behavior are designed with this understanding in mind. The field of human factors psychology is concerned with improving technological systems’ usability, efficacy, and user happiness through optimal design. Human factors research helps designers of user interfaces, authentication systems, and security guidelines in cybersecurity to limit cognitive overload, encourage safe behavior, and lower the probability of mistakes. Psychologists could, for instance, research how easy it is for users to utilize password managers in order to increase user acceptance and efficacy.
When it comes to psychology and criminology theories my first thought would be Routine Activity Theory. This theory suggests that crime occurs when three elements converge: a motivated offender, a suitable target, and the absence of a capable guardian. Cybersecurity strategies aim to disrupt the routine activities of cybercriminals by reducing the availability of vulnerable targets and increasing the presence of capable guardians. These offenders don’t just have a heat of the moment vulnerability, No, they purposely have this routine of taking people’s identities for entertainment. This is why I feel this is a major psychological situation.
To be able to understand this theory in cybersecurity you can’t just be good at coding, detecting, or just have cyber security knowledge. With this world in the field you have to think like a criminal. “However, many cybersecurity researchers have come to realize that to gain a full understanding of how to protect a cyberenvironment requires not only the knowledge of those researchers in computer science, engineering, and mathematics, but those who have a deeper understanding of human behavior: researchers with expertise in the various branches of behavioral science, such as psychology, behavioral economics, and other aspects of brain science”( Patterson,Winston-Proctor, 2019, p.23).
CyberLaw Theory
Cyberlaw encompasses the legal frameworks and regulations that govern activities conducted in cyberspace, including cybersecurity. On the other hand, cybersecurity describes the procedures and policies put in place to shield data, networks, and digital systems against intrusions, cyberattacks, and other security risks. In order to safeguard digital assets and uphold confidence in online interactions, cyberlaw and cybersecurity must work together. Social learning theory , it can be used to explain how exposure to online groups or peer pressure might lead to an individual becoming involved in cybercrime.
Cyberlaw states that people who are exposed to online groups where deviant behavior is accepted or even promoted may pick up similar behaviors, such hacking or online harassment. These virtual communities function as forums for the exchange of information, tactics, and incentives pertaining to cybercrime, thereby impacting people’s perspectives and actions about adherence to cyberlaw. “As data breaches, denial-of-service attacks, and other cybersecurity incidents lead to extraordinary economic and national security consequences, commentators increasingly look to the legal system for solutions. Unfortunately, U.S. laws do not have a unified and coherent vision for the regulation and promotion of cybersecurity. For that matter, the U.S. legal system lacks a consistent definition of the term “cybersecurity law.” This Article aims to fill that gap by defining “cybersecurity law””(Kosseff, 2018).
As Cyberlaw is still in the works with punishment of offenses and cybersecurity growing, I believe Cyber Law can be more advanced. I wanted to shine more light into this subject to show cybersecurity is larry knew and progressing each day
Common Grounds
Cybersecurity initiatives utilize criminological ideas to guide the creation and application of tactics meant to stop, identify, and address cyberthreats. Cybersecurity experts can better defend people, companies, and society from the effects of cybercrime by comprehending the underlying motivations and dynamics of cybercriminal conduct. Day by day cybersecurity and it’s interdisciplinary studies are coming together to make the internet safer.
References:
Kosseff, J. (2018). Defining Cybersecurity Law. Iowa Law Review, 103(3), 985-1031. http://proxy.lib.odu.edu/login?url=https://www.proquest.com/scholarly-journals/defining-cybersecurity-law/docview/2187899333/se-2
Lee, C. S., & Chua, Y. T. (2023). The Role of Cybersecurity Knowledge and Awareness in Cybersecurity Intention and Behavior in the United States. Crime & Delinquency, 0(0). https://doi.org/10.1177/00111287231180093Links to an external site.
Leukfeldt, R., & Holt, T. J. (Eds.). (2019). The human factor of cybercrime. Taylor & Francis Group.
Waddell M. Human factors in cybersecurity: Designing an effective cybersecurity education program for healthcare staff. Healthcare Management Forum. 2024;37(1):13-16. doi:10.1177/08404704231196137
Winston-Proctor & Wayne Patterson, Cynthia E. (2019) Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science. CRC Press.
Introduction to Information Systems
An introduction to the major hardware/software components of
modern information systems. Topics include introduction to the history of computers,
numbering systems conversion, system and application software, networks and the Internet.
Additional topics include Information Systems and Systems Development Life Cycle,
Introduction to Programming, Databases and Business Intelligence, Information Security, and
Privacy and Ethics in the cyber world. Intended as a comprehensive introduction course to the
Information Systems majors. In this assignment, the skills I learned were the business point of view in IT/Cyber world.
FOUNDATIONS OF DATA SCIENCE
The choices we make in organizing, presenting, and analyzing data can influence its interpretation and utility, ultimately affecting decision-making and impacting our lives and those around us. As consumers of massive amounts of data, we may believe that we act autonomously in drawing conclusions from information presented to us in tables, charts, and figures, and that the models and methods used are appropriate for the task at hand. This course provides an interdisciplinary overview of data science, and we will explore big ideas about the nature of data and how we can use it to solve problems, which will allow us to both solve our own problems and critically evaluate solutions presented to us. In this assignment the skill I learned how to make visualizations for data.
Basic Cybersecurity Programming and Networking
This course introduces students to the logic used to develop solutions to common problems in the
computer science field using a contemporary high-level programming language, such as Python. These
step-by-step detail solutions are called algorithms and serve as the basic solution in the area of
Cybersecurity. Problem-solving, critical thinking, and programming techniques are emphasized
throughout the course. Topics include Introduction to Cybersecurity, Computer Network, program
logic, and file management.
This assignment provides you with a deeper understanding and practical experience of strings.
Introduction to Criminology
This course will provide a fundamental understanding of criminal justice research,
criminological theory, as well as crime and the criminal justice system. The course will begin introducing the field of criminology and the different definitions of crime. A significant portion
of the course will be dedicated to reviewing and exploring theoretical explanations of crime and
how they are used to guide research and policy in criminal justice. This course will also provide
students with a basic understanding of research methods in criminology. Upon completing this
course, students should have a general understanding of criminal offending and its explanations,
research methods in criminology, as well as crime and victimization as social phenomena.