Journal 13

When it comes to the development of cyber-policy and infrastructure, one should approach it with caution. That caution should be borne from the fact that we do lack better predictive capabilities. That could be why policies in regards to this field can seem to be lagging behind. As the infrastructure becomes more complicated and larger,…

Journal 12

As technology has advanced, the interactions between victims and offenders of stalking and harassment have changed drastically. Stalkers no longer need to follow their victims physically to watch them. Now they can do it more easily with tech such as webcams and smartphones. Stalkers can also do this while keeping complete anonymity from their victim….

Journal 11

Criminal justice and the field of cybercrime overlap in the way that they are both fields in sociology and psychology. Both draw heavily from the understanding of how criminals think and the methods they employ. It has been argued that cybercrime is simply old crimes taking on new forms while others may state that they…

Journal 10

System security engineers make networks safer by putting plans into place, that once acted upon, protect business and industrial assets. By detailing objectives for security teams to meet, they are essentially the roadmaps leading to the adequate defense of a company’s network. Engineers can do this by assessing the priority needs for protection of assets….

Journal 8

There is no way to actually tell if your computer is safe. This comes from the fact that criminals are always seeking new ways to compromise the systems of unsuspecting users. As the attack methods become more advanced there will always be some new vulnerability that can be discovered and exploited against victims of any…

Journal 7

It can be agreed upon that a cyber security program for any business would be a good idea. But while it is a good idea, a corporation will need to keep in mind the costs of running a cybersecurity program. The biggest concern that comes up for any business or corporation is money. To put…

Journal 6

Introducing cyber technology to the work environment was like opening Pandora’s box. Due to the revolution in how business is conducted, new types of deviant behavior were able to develop, along with old deviant behavior taking on new forms. For example, if a disgruntled employee wanted to spy on his boss for competitors, instead of…

Journal 5

Create DiD protocols for a company YouTube security analyst employee Bug bounties Enforcing company cyber policy/ Recon, good to use against organizations as a red team memeber Secure employer network infrastructure Entering ctf events for money Cracking passwords, as a red teamer URL attacks (red team) Recovery phase after a cyber event Intelligence gathering/recon Testing…

Journal 4

While comparing risks between United States and Australian cyber security risks one must first look at how both countries approach those risks. According to a 2016 article from nist.gov, the United States the Fisma Risk Management Framework, a decision-making aid for applying appropriate security controls, requires agencies to implement controls from the SP 800-53. The…

Journal #3

Four ethical issues that arise when storing the personal information of individuals are: privacy, accessibility, property, and accuracy. Privacy Without the rights to privacy online, unsuspecting people could be more easily targeted by those who would seek to leverage that private information against their victims. The fact that the user who sends that information to…