Kyle Sershon – IT Professional

CYSE 200T

Here you can view my posts from CYSE 200T

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

Posted by on 12:36 am in CYSE 200T | 0 comments

When developing cyber-policy and framing infrastructure, we must understand what threats are faced. Most technology is developed with the intention that it will be used for the greater good. In the past science and the advancement of technology have developed without fully understanding the capabilities of what has been created. A good example of this was the splitting of the atom in the 1930s. Granted there is no doubt that this benefited humanity in the means of harvesting energy but witnessing the aftermath of the bombs dropped on...

read more

How does cyber technology impact interactions between offenders and victims?

Posted by on 3:10 am in CYSE 200T | 0 comments

Cyber technology has impacted interactions between victims and offenders by creating a new world in which most traditional crimes can take place. It has been shown that anonymity has a hand in this. Users online can interact anonymously, which may leave some offenders feeling more comfortable in carrying out their crimes. In a traditional harassment case, in most cases, a victim knows who their assailant is, however, with the use of cyber technology a harasser peruses their victim with a lower risk of repercussions. The scale at which an...

read more

Module 12 – What is the overlap between criminal justice and cyber crime? How does this overlap relate to the other disciplines discussed in this class?

Posted by on 9:40 pm in CYSE 200T | 0 comments

As technology has become entangled in nearly everyone’s life, it has created a new focus on crimes committed over the internet. These crimes are committed in every aspect of society. Legislation has fallen behind the increasing prevalence of these crimes. Companies scramble to keep their defenses up to date with rapidly evolving technology. In minutes, a hacker can gain access to critical infrastructure, hijack systems, and create chaos in the lives of millions. Victims can be stalked and harassed anonymously over the internet. White Collar...

read more

Module 11 – Describe three ways that computers have made the world safer and less safe.

Posted by on 2:18 pm in CYSE 200T | 0 comments

Computers have benefited society for decades. As technology has improved, and the internet has been accessible to most, it has made the world safer, but also a more dangerous place. Computers have incredible power and allow humans to process data and information beyond the limits of a person. One way computers have made the world safer is with advanced weather prediction systems. Meteorologist now have the data to be able to predict weather patterns and spot life threatening conditions earlier than possible. Computers have also benefited...

read more

Module 9 – How can you tell if your computer is safe

Posted by on 1:22 pm in CYSE 200T | 0 comments

There are many ways you can tell if a computer is safe, but it takes multiple layers of protection. It would be unwise to say that just because your computer is running antivirus, that you 100% free of threats. A computer should be protected not just from Malware, but physical threats as well. It is important to lock down a computer and if a PC is used in public spaces, to ensure the computer is protected by observing for strange behavior or if a PC has been tampered with. Modern Computers use bit locker to encrypt data and modern 2.0 TPM...

read more

Module 8 – What are the costs and benefits of developing cybersecurity programs in business?

Posted by on 7:08 pm in CYSE 200T | 0 comments

Although costs for developing a cybersecurity program in a business can be easily determined in a dollar sense, the benefits always outweigh the initial cost. “the average cost of a breach in 2020 is $3.86 million” – (https://inspiredelearning.com/security-awareness/). With these numbers in mind, it is easy to see how the cost of starting and continuing a cyber security program in a business can be easily justified. Cyber Security programs must address multiple issues but can end up saving a business millions in liability. Cyber Security is...

read more

Module 6 – How has cyber technology created opportunities for workplace deviance?

Posted by on 4:05 pm in CYSE 200T | 0 comments

Technology has created many opportunities for workplace deviance. Cybercrime or crime in general is described as “White-Collar Crime”. White-collar crime refers to a crime normally committed by professionals in a workplace environment. The integration of technology into business has helped with productivity and enabled businesses to work more efficiently at higher volumes. However, just as technology can be used for good, professionals with malicious intent can use technology to commit crimes. There are “Legitimate white-collar cybercrimes”...

read more

Module 5 – CYBERSECURITY

Posted by on 2:01 am in CYSE 200T | 0 comments

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  Cyber warfare for national defenseYearly penetration testing serviceBuild out a secure office networkEnterprise cyber defense teamRecovery servicesStrengthen U.S. cybersecurity legislation with a organizations like CISAEthical hackingCreate comprehensive security strategies for businessesUniversity cybersecurity professorRetrieve data through digital forensicsInvent a new Anti-Virus softwareTeach cybersecurity awareness trainingYouth...

read more

Module 4 – Compare cybersecurity risks in the U.S. and another country

Posted by on 12:40 pm in CYSE 200T | 0 comments

Comparing Cyber Security risks between the United States and other countries will show many similarities.  Specifically looking at the comparisons between China’s Risks and our own. Both our countries have critical infrastructure such as power grids. Security regarding the safe keeping of national secrets and the need to keep up a constant defense against what the country deems a threat. Just like the United States, China has rules and laws protecting confidential information such as the “Right of Privacy and Protection of Personal...

read more

Module 3 – Describe four ethical issues that arise when storing electronic information about individuals.

Posted by on 9:47 pm in CYSE 200T | 0 comments

Informed consent – How many times have you accepted a Terms of Service agreement without reading it? Do you know how your data will be used and stored once you agree? Big data has a value on it. Social Media, E-commerce websites, just about every online service collects information from all of us. That data can be sold or shared without your knowledge. It can be used to manipulate your online experience, promote products, or sold by data brokers. Furthermore, most people admit to accepting ToS agreements without ever reading them. However,...

read more