1. Why am I interested in cybersecurity?

As a child, I always wanted to be able to make a difference in the world. As we step further into a future immersed in technology, it came to my attention that the best way for me to make a difference would be to help defend good people against people who prey upon the weak-minded. Scammers and thieves are the worst people and have no morals. I have had my fair share of run-ins with people who wanted some form of compensation in order for me to get something back. I despise people like that.
Also, I would like to feel secure in my everyday actions. I spend ample time on social media throughout the day, and the prospect of someone watching me and what I do through social media is frightening. The conversations that I have with people are for just us, not for the whole world to see. Social media platforms should not have the right to sell consumer information, but we all know they will anyways. I also shop online a lot, so it would be nice to see that where I shop has certain precautions to make sure that valued customers feel safe using their services.
I have always wanted to be able to financially support myself, and it seems that this may be the best option. I already have some background in it from high school and would love to be able to prove myself. I also plan on trying to create my own company in the future and help my family out here and there.
Overall, it is a great stepping stone for me to learn how to provide for myself. The things you learn in cyber security translate to many other things in everyday life. It is all about being more cautious than the next.

2. What are 4 majors offered by Old Dominion University that relate to cybersecurity?

Criminology is a major that is closely related to cybersecurity. They focus on the “why” of crime. Criminology tries to find patterns and reasonings as to why these people are committing crimes. They come up with theories and try to pinpoint where society has gone wrong. A lot of criminals come from low-income backgrounds and life is usually very difficult for them. That leads to them committing crimes to stay afloat in this world. Cyber criminology is “the study of causation of crimes that occur in cyberspace and its impact in the physical space”.
Philosophy is a major that relates to cybersecurity as well. Philosophy is about the “systematic analysis of the basic concepts, logic, and evidentiary structures of all other fields of knowledge”. Many times, it creates the basis of what is moral and what is not. Philosophy can also help us understand why we think the way we do when we run into obstacles.
Leadership is another major that could really go hand in hand with cybersecurity. To be a cybersecurity specialist you need initiative. You need to be able to roll with the punches that come your way. Leadership can teach you how to be a good boss and a better people person. It can also teach you how to respond to breaches in your company.
Engineers are people who apply the principles of science and math to develop economical solutions to technical problems. Many things we use are a product of engineering such as telecommunications, waste, and water systems. A lot of the things we use are subject to cyber threats and attacks. Some people are terrible and try to derail those systems. The products of engineering can be attacked physically, or people can have their data stolen just for working on a high profile project.

3. Describe four ethical issues that arise when storing electronic information about individuals.

The technique of storing electronic data has become widespread in various industries in the current digital era. However, this technique presents a number of ethical concerns, particularly when it comes to preserving personal data.

Privacy is the first ethical dilemma that appears. It is essential to make sure that people’s privacy is safeguarded when storing electronic information on them. This indicates that the data should be kept private and should only be accessed by authorized persons. However, there is always a chance that this information could be accessed by someone else without authorization, which could result in a privacy violation. In order to prevent unwanted access to electronic information, businesses must install the necessary security measures, such as encryption and access controls. Accurate data is the second ethical dilemma. For information to be valuable in the digital age, it must be accurate and current. But it can be difficult to keep correct data up to date, particularly when dealing with enormous amounts of data. An individual may suffer major repercussions as a result of making the wrong decision based on inaccurate information. The accuracy of electronic information must therefore be preserved by ensuring that it is constantly reviewed and updated. The third ethical dilemma is about ownership of data. People do not know how their data will be stored or used when they provide it. Companies that gather electronic data must be open and honest about the information’s ownership and intended use. People should be able to access and manage their information, including the ability to fix any errors. Data security is the fourth ethical issue. Information stored electronically is susceptible to security breaches like theft or hacking. The right security measures must be put in place by companies that store electronic data to guard against these intrusions. Firewalls, encryption, and strong passwords are a few examples of these safeguards. Organizations must also have a strategy in place for handling security breaches, including how to notify those affected and how to lessen the impact they have. In conclusion, keeping electronic records for individuals offers a number of ethical issues, including those relating to privacy, data accuracy, data ownership, and data security. To ensure that electronic information is stored and utilized responsibly, businesses must address these challenges. This requires putting in place the necessary security precautions, keeping accurate and current records, being open about who owns the data, and having a plan in place to handle security breaches.

4. Compare cybersecurity risks in the U.S. and another country.

The quality of cybersecurity infrastructure varies between the US and Turkey, and as a result, the two countries are subject to various cybersecurity concerns. While Turkey has a developing cybersecurity landscape, the United States has a solid cybersecurity infrastructure. The USA faces various cybersecurity risks, including state-sponsored hacking, cyber espionage, ransomware attacks, and supply chain attacks. The country is also susceptible to cyberattacks from criminal groups that target individuals, corporations, and government agencies. The creation of the Cybersecurity and Infrastructure Security Agency and the passage of the Cybersecurity Information Sharing Act are just two of the steps taken by the US government to reduce these risks. The latest high-profile cyberattacks like the SolarWinds compromise and the Colonial Pipeline ransomware attack, however, show that the US is still exposed to them. Despite having a less advanced cybersecurity infrastructure than the US, Turkey still faces cybersecurity threats. Phishing attacks, malware infections, and cyber espionage are the main cybersecurity dangers in Turkey. Over the past few years, Turkey has experienced a rise in cyberattacks, mainly from organizations linked to the Islamic State and the Kurdistan Workers’ Party (PKK). The National Cyber Security Council was established, and a National Cyber Security Strategy was created as part of the Turkish government’s efforts to strengthen its cybersecurity framework. Due to its more advanced cybersecurity infrastructure and its position as a significant global power, the US faces a larger variety of cybersecurity vulnerabilities than Turkey. On the other hand, Turkey still needs to build its cybersecurity infrastructure and is subject to more localized threats from local terrorist organizations. Both nations must continue to invest in their cybersecurity skills though, as they are both vulnerable to cyberattacks.

5. Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. 

c- consulting services

y- youtube videos on how to fix different issues

b- bounty hunting for different bugs and malware

e- ethical hacking

r- remote work opportunities

s- selling cybersecurity software

e- end to end encryption applications

c- cloud platform services

u- upgrading someone’s security systems

r- running a business that informs people of safe cyber security habits

i- incident response team hotline

t- testing in the penetration testing area

y- you can do audits for companies

6. How has cyber technology created opportunities for workplace deviance?

The development of cyber technology has fundamentally changed how we conduct business and interact with one another. It has enhanced communication and efficiency at work, among other things, but it has also given rise to opportunities for workplace misconduct. Access to sensitive information is one way that cyber technology has made it easier for workplace deviation. It is now easier for employees to access and misuse personal information due to the increase in the amount of data being stored online. For instance, a worker might take confidential data from the database of their employer, including client information, trade secrets, or financial data, and sell it to rivals or use it to commit fraud. Social media usage is another way that cyber technology has made workplace deviation possible. Facebook, Twitter, and LinkedIn are a few examples of the social media sites that have opened up new avenues for workplace misconduct. Social media can be used by employees to share sensitive information, harm their employer’s reputation, or intimidate, harass, or slander their coworkers. The act of wasting time while at work, commonly known as time theft, has become easier for employees because of cyber technology. Due to the growth of the internet, workers can now access social media, online stores, and other distractions on their computers and cellphones during working hours. This could result in lower productivity and financial loss for the business. Along with these instances, cyber technology has made it possible for workplace deviation through the use of hacking, cyberbullying, and other forms of cybercrime. For example, an employee could break into the company’s network and steal sensitive data, or they could engage in cyberbullying by harassing a coworker online. In conclusion, while cyber technology has given workplaces many chances to boost their effectiveness and production, it has also made workplace deviation more probable. Employers must be aware of these dangers and take action to prevent and minimize them. Some of these actions include creating clear rules and procedures, putting in place security measures to guard against cyber attacks, and educating and training staff on how to use technology responsibly.

7.  What are the costs and benefits of developing cybersecurity programs in business?

Developing a cybersecurity program has costs and benefits. Cybersecurity is super important in today’s day and age, it helps businesses to protect their data, intellectual property, and reputation. The cost of creating a cybersecurity program could be high. To adopt and manage cybersecurity safeguards, businesses need to make investments in hardware, software, and personnel. Even for small businesses, this can be a considerable financial burden. Cybersecurity calls for particular knowledge and abilities. Employees must receive training in the best methods for safeguarding sensitive data and fending off online attacks. This training may take a lot of time and money. Data security standards and compliance requirements are common across many industries, which raises the cost of compliance. These laws must be followed by businesses in order to avoid fines and reputational harm. Because it calls for specialized staff, equipment, and software, compliance can be costly. While all of these costs may look bad, the benefits just might outweigh the costs. Cybersecurity programs help protect sensitive data such as intellectual data. That data can sometimes be what makes or breaks a company, and any leak or breach can mean a heavy cost for the company. Cybersecurity programs also help protect consumer information. In order to protect customers and make sure they are happy; you need to make sure that their trust is earned and kept. Cybersecurity programs can also help ward off legal troubles. Businesses that experience a data breach or other cyber-attack may be subject to severe legal consequences and reputational harm. Also, customers are more likely to do business with a secured firm rather than someone who doesn’t have a cybersecurity program. In conclusion, even if creating a cybersecurity program can be expensive, the advantages greatly outweigh the disadvantages. Businesses in the digital age cannot afford to ignore the benefits of a cybersecurity program, including the safeguarding of company assets and consumer data, the reduction of legal and reputational risk, and the competitive edge it offers.

8.   How can you tell if your computer is safe?

Make sure your software and operating system are current. This aids in addressing any security flaws that could have been identified. Install antivirus software to help defend your computer from malware, viruses, and other sorts of threats. Ensure that you have credible antivirus software installed and that it is up to date. Check that your firewall is activated and set up correctly. A firewall can stop harmful communications and safeguard your computer from unauthorized access. For all of your online accounts, use strong, one-of-a-kind passwords, and whenever you can, establish two-factor authentication. Use caution when opening email attachments or clicking on links in emails from unknown senders. Only trustworthy sources should be used to download software, therefore stay away from unreliable websites. Protect sensitive data, including financial and identity-related information, with methods of encryption. Use a Virtual Private Network (VPN) to safeguard your data and privacy online. A VPN works by establishing an encrypted tunnel between your computer and the internet.
Regularly check your internet accounts and financial statements for any questionable activity. Report any unauthorized conduct right once to the appropriate authorities. In order to keep your computer safe, you must be constantly vigilant and mindful of security threats.

9.  Describe three ways that computers have made the world safer and less safe.

The way emergency services operate has changed as a result of computers. Computers are used by emergency services including the police, fire, and ambulance departments to respond rapidly to emergencies. They can track and pinpoint the precise position of the incident with the aid of computers, and they can also send the closest personnel to the scene. Because of the greatly shortened reaction times, it is now easier for rescue workers to save lives. By enhancing security across a number of industries, computers have made the world a safer place. In airports, for instance, computers are used to screen travelers and look for any potential dangers. In order to stop theft, vandalism, and unwanted access, residential and commercial properties also utilize computer-based security systems. Over time, these security measures have improved and become more sophisticated, making it more difficult for criminals to compromise them. Computers have significantly contributed to the advancement of medicine, which has led to a safer community. Computers are used by medical experts to monitor patient health and make sickness assessments. Complex medical procedures like surgery and organ transplants are being carried out using computer-based medical technology. Many lives have been saved and patient outcomes have improved thanks to these developments. While these developments help make the world a better place, there are some effects of rapid computerization that are not so great. Cybercrime is one of the main ways that computers have contributed to the world being less secure. Computers can be used by cybercriminals to steal sensitive data, including personal and banking information. They can also launch cyberattacks to harm computer systems and interfere with vital infrastructure, such as water supply and electricity grids. Online harassment and cyberbullying are now commonplace on social media. Computers have made it simpler for people to bully and harass others in an anonymous manner, which can result in emotional suffering and in some cases even lead to suicide. Social media has also been used to spread propaganda and disinformation, which can undermine democracy and stir up civil unrest. Computers have contributed to the increasing issue of screen time and addiction. More people than ever before spend time on their computers and mobile devices, especially young children. Social networking, online games, and other online activities have become addictive as a result of this. Long-term screen use has been associated with a number of detrimental health outcomes, such as depression, sleep deprivation, and obesity. All in all, there are definitely benefits to digitizing the world we live in, but there are also dire consequences.

10. How do engineers make cyber networks safer?

Cyber networks are intricate systems that can be attacked by viruses, hackers, and other security risks. Engineers identify and reduce potential security vulnerabilities in order to make these networks safer. To find potential dangers and weaknesses in the cyber network, engineers first do a risk assessment. To find potential security holes in the network, they employ a variety of tools and techniques, including vulnerability scanners, penetration testing, and threat modeling. Access control methods are also used by engineers to limit access to private data and network resources. This includes methods such as role-based access control, two-factor authentication, and privilege escalation management. Engineers monitor network traffic with the help of intrusion detection and prevention systems (IDS/IPS) to find potential security risks. To find possible security threats and stop them from doing harm, these systems employ a variety of techniques such anomaly-based detection, signature-based detection, and machine learning algorithms. Organizing the network into smaller, easier-to-manage subnetworks is one efficient method for enhancing cybersecurity. By preventing attackers from traveling laterally across the network, this lessens the effect of a security breach. Network segmentation is implemented by engineers using tools like network firewalls and virtual local area networks (VLANs). Data in transit and at rest can be protected via encryption. Engineers encrypt data using a variety of encryption protocols and algorithms, including SSL/TLS, AES, and RSA, to guard against unauthorized access and data breaches. Engineering teams also frequently update software and firmware with security updates and bug fixes to keep the network secure. To find and fix network vulnerabilities, they also employ vulnerability management technologies. Engineers evaluate, keep an eye on, and defend the network against potential security risks, they employ a number of approaches, tools, and technologies. They may make the network safer for users as well as businesses by putting these measures in place to lower the chance of cyberattacks, data breaches, and other security issues. They are an essential part of a network.

11. What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

Investigating, pursuing, and preventing crimes that take place online are all aspects of criminal justice and cybercrime overlapping fields. Hacking, identity theft, cyberstalking, and phishing schemes are just a few examples of criminal conduct known as “cybercrime,” which involves the use of technology. The frequency and complexity of these crimes are rising, necessitating the need for law enforcement organizations and criminal justice experts to have a good grasp on both established methods of the justice system and contemporary developments in technology. Cybercrime and criminal justice intersect in ways that are related to the other topics we’ve covered in class, including computer science, psychology, and sociology. Psychology and sociology aid in our understanding of the motivations behind these crimes and how they affect both individuals and society as a whole, while computer science provides the technical expertise required to identify and trace cybercriminals. Legal and policy challenges also arise when criminal justice and cybercrime intersect. Laws and regulations must be revised as cybercrime spreads to reflect new dangers and safeguard victims’ rights. For instance, regulations governing cyberstalking, revenge porn, and other online offenses that did not exist before the internet era may need to be amended. The need for international coordination and cooperation is highlighted by the intersection between criminal justice and cybercrime. In order to properly investigate and prosecute cybercriminals, law enforcement agencies and governments from all around the world must work together. The overlap is significant and requires and interdisciplinary approach to effectively safeguard information. It is of the utmost necessity that cybersecurity professionals have an understanding of how cybercrime works and how to protect against it.

12. How does cyber technology impact interactions between offenders and victims?

The interactions between criminals and victims have been significantly impacted by cyber technology. As social media and the internet have grown in popularity, it has been simpler for criminals to target and victimize people through a range of cybercrimes such cyberbullying, harassment, stalking, identity theft, and fraud. Cyberspace has given criminals new avenues to communicate with their victims, and in certain situations, it has also made it simpler for them to remain anonymous and avoid capture. Cyber technology has had a huge impact on the relationships between perpetrators and victims, among other things by giving perpetrators access to a larger audience. A cyberbully might, for instance, harass their victim through message or social media platforms that are accessible to many people. As the victim may feel unable to stop the harassment, this can cause the victim serious harm. Cyber technology has also given criminals new ways to select and take advantage of their victims. Social media and messaging services can be used by criminals to build relationships with vulnerable individuals, including children or teenagers, and subsequently to take advantage of or abuse those interactions. Additionally, accessing and disseminating illicit material like child pornography, which can seriously hurt victims, has become simpler for criminals thanks to the internet. Additionally, criminals can utilize the internet to spread dangerous materials like revenge porn, which can cause victims to experience extreme mental suffering as well as harm to their reputations. In conclusion, cyber technology has significantly changed how offenders and victims interact. In addition to giving criminals new opportunities to target and victimize people, it has also presented new difficulties for criminal justice specialists and law enforcement organizations. To create efficient ways for stopping and combating cybercrime as well as helping victims, it is crucial to comprehend these effects on people. 

13. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

To shield people and organizations from online dangers, cybersecurity policies and infrastructure must be developed. It becomes difficult to create efficient cybersecurity rules and infrastructure due to the rapid advancement of technology. It is made even more difficult by the restricted capacity to foresee potential cyber threats, often known as the “short arm” of predictive knowledge. To solve this problem, a flexible strategy is required so that infrastructure and regulations can respond to new threats. We should begin by using recognized security standards in order to create efficient cybersecurity policies and architecture. Two-factor authentication, encryption, and access controls are some of the protocols included in these systems. We can build a solid cybersecurity foundation that is flexible by implementing these protocols. Another method we might use to handle cybersecurity is risk management. Continuous monitoring, assessment, and response are emphasized in this strategy. It entails locating potential risks and weaknesses, evaluating the likelihood and severity of such risks, and putting controls and mitigation measures in place to deal with them. In order to adapt to emerging dangers, policies and infrastructure can be adjusted with the help of regular monitoring and assessment. To enhance overall cybersecurity, cooperation and information sharing between the public and commercial sectors is also crucial. Since cyber risks are not unique to one company or industry, sharing knowledge and best practices can help to strengthen cybersecurity. Public-private partnerships and other measures that encourage information sharing and collaboration can help to foster this collaboration. In conclusion, creating cybersecurity infrastructure and rules requires a flexible strategy that can respond to new threats. The creation of efficient policies and infrastructure requires a solid foundation, risk management, teamwork, and information sharing. We can better defend people and businesses from online threats by using these strategies.