Journal Entry 3: FIDO
Jason Bonniwell
October 13, 2019
FIDO Alliance is a web provider that makes the web much more secure in everyway by such as cleaning the web browsers by making them go through them and that makes the overall internet a safer place. They are supported by windows 10, android, Firefox, safari, and Microsoft edge. Which makes them very expansive in everyway by being with everyone. FIDO also brings much security when it comes to password safety by adding the ability to use biometrics, security keys and mobile devices in order to get logged in. This adds the ability for them to add more convenience to your life. FIDO also adds a security to privacy because going through them they have a separate password for every induvial site making them great overall. FIDO was created in 2012 in order to combat the lack of strong authentication on the internet. FIDO was created to protect everyone on the web, and it was created for free in order to keep the web open and plentiful with the safety security everyone wants. FIDO2 is the part with the password safety and FIDO is the overall organization. They used these password safeties in order to advance multi factor authentication because there have been no advancements and without these, we would be much more unsafe overall. The W3C is the company that is working with and partners with FIDO and there mission statement is “is to lead the Web to its full potential by creating technical standards and guidelines to ensure that the Web remains open, accessible, and interoperable for everyone around the globe. That is there exact statement straight from them and is quoted as such. They also believe in the same things as FIDO such as creating a safe and useable net for everyone and this makes them a net good for society and are helpful in everything they do and that is what FIDO and W3C is and what they are about.
Jason Bonniwell
Sunday, November 10, 2019
Journal Entry 4
Cybercrime and Criminal Justice overlap in a considerable amount of ways starting of with there are many different versions of the two sections they both overlap because criminals are finding new ways to get out of criminal justice process by outsourcing to new technology and getting away with it. Cyber crime can be as a traditional crime as there is in the real world of criminal justice which is a small crime committed and the problem is created when a company or person is affected because of the cost of what your doing or you just being deviant. These overlaps also continue on to White color crime because when a person high in society has an issue with the company they will respond negatively but instead of causing a scene with a gun or weapon they go to the internet and cause disturbance through the world web which is a growing and big issue. In Criminal justice there are things known as socially constructed crimes and cyber crime happens to fall into that category. social construction refers to the possibility that certain crimes are socially constructed as illegal acts. That is the definition taken directly from the source material. They connect in all these way but cyber crime is just a branch out from the rest of criminal justice because as time went on the went from a grand horse stealing heist into a car heist and now this is the next evolution of that and with that said they overlap in many different ways. This overlap relates to other disciplines because everything is connected in these issues everything is an evolution of the next thing the difference this may have on other things is that these or very interlocking issues that go hand in hand I feel that with other things are not as connected but this overlap is one that is tightly connected and very different than many pother crimes would have been
Payne, Bryan K, et al. “12a – Using_Labeling_Theory_as_a_Guide_to_Examine_the_Pa module11.Pdf.” Google Drive, Google, 3 Nov. 2018, drive.google.com/file/d/1nVyXy0Ty1v5f6U5oClx2LMz-TIOuQehE/view.
Technology Innovation Management review
Jason Bonniwell
9/8/2019
Journal entry 2
A Framework is something that includes a methodology to protect individual privacy and civil liberties when critical infrastructure organizations conduct cybersecurity activities. This is helpful and useful for many people because when people and companies have private data or information, they can put it through a framework in order to protect it from cyber security threats. This framework puts everyone in a better position because their information can not be stolen as easily as it could have been. The reason this is so important is because cyber-attacks have been rising and they need a counter cybersecurity to help which is what this framework is. The first of the five core activities include the word identify. Identify is what they do to begin in order to asses certain risk standards when managing the framework which makes it easier to decide whose business you want. The next function of the framework is to protect which is used in management and access control which decide which protection process will be used. The third function is detect which is a very simple function all it does is when there is a cyber security threat it will detect and decide what to do going to the next functions in a quick and timely manner. The fourth function is respond which is right after detect because once the threat has been detected it moves to the respond function which plans and decides what is going to be done about the cyber security threat. Finally the last function is recover which happens when the threat has been dealt with and the respond function is completed this function makes sure everything gets back to normal on your system and network and nothing goes wrong on the back end of the threat and that completes all of the five core functions of NIST.
The only citations used are from the modules and they cannot no be cited I do not believe
What role do engineers have in managing cyber-risks?
Jason Bonniwell
9/22/2019
Journal Entry 1
Engineers play many roles in managing and mitigating cyber-risks through everything they do because they are the people who shape cybersecurity when making it.. A cyber risk is anything that poses a threat to a specific system such as in the cyberspace or on a critical infrastructure that companies use They start by researching each and every system in order to understand the inner workings of the cyberspace and when fully researched they develop systems and solutions that will manage and mitigate potential problems. They also create basic structures that provide novel functions because they can be spread and easily applied across the cyber space. These engineers will also use the electromagnetic spectrum in order to manage and mitigate these risks because if you can add extra steps for the risks to go through the safer you are. Another thing they do is use mathematical structures and systems in order to encode certain systems and function in order to protect against any small attack such as script kitties. They can be easily deterred if using the correct systems which is what engineers are for. They also are used in decided how big a cyber risk is. They can look at any given situation and analyze it then when it is time to act, they know what functions and systems you are to use when combating the cyber threats as a whole. The good thing in the use of engineers are the versatility because when some people can only read specific thing engineers are used to create and detect different things that can solve an overall problem. Without them everyone would be in much worse shape because cyber security would be no where near as safe and that is the roles, they play in managing and mitigating cyber risks and creating cyber security.
Moselane, Peea. “What Is the Difference between Cyber Security and Cyber Engineering?” Quora, 22 May 2016, www.quora.com/What-is-the-difference-between-cyber-securityand-cyber-engineering