{"id":133,"date":"2021-05-06T08:50:05","date_gmt":"2021-05-06T08:50:05","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2022-04-29T17:44:51","modified_gmt":"2022-04-29T17:44:51","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/m\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"<h1 style=\"text-align: center\">Journal Entry 1<\/h1>\n\n\n<p>The reason that I am interested in cybersecurity technology is because technology is a large part of everyday life. Technology will continue to grow far into the future, and with that it in mind, new types of risks and issues will rise alongside this growth in technology. Since I spend most of my time on the computer already, I thought it would be a good idea to pursue something that involves working with computers. As technology continues to grow, society might not be prepared to face all the new challenges there will be when it comes to security. There are still many people who aren\u2019t very tech savvy, and so they are more likely at risk. I would like to do everything I can to protect people\u2019s private information while also informing them about what they could do to protect themselves. I believe that informing people is just as important as protecting, recovering, and solving issues. When a breach occurs, it is very important to know how to react and do things in a timely manner. Part of being a specialist in the field of cybersecurity is to plan things ahead of time so that when an event occurs, there is no time wasted and there will be less damage. Some of the damages included in a security breach could lead to financial loss, stolen data, business disruption, and so on. Business continuity is very important, if an ISP for example were to be attacked, then everyone accessing Internet through them would be affected. This would mean that customers would have to wait for the attack to be dealt with to use the internet again. As mentioned above, technology is a huge part of everyday life, many people use it for a variety of things such as school, work, communication, and so on. Without the Internet, it would inconvenience and waste the time of the people who rely on the Internet for those things. Some people rely on the Internet to make a living. With it being down, there could be a loss to some of their income depending on how long it takes to resolve the issues.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\">Journal Entry 2<\/h2>\n\n\n\n<p>There are many majors at ODU that can relate to cybersecurity; four of them could be in mental health services, criminal justice, accounting, and management information systems. With mental health services, there involves a lot of sensitive information on patients being entered into computer records. It is important that there are protective measures that are set in place to prevent any information to be stolen. Attackers could do anything with stolen health records. If patients wanted to keep their conditions secret from others, attackers would be able to release those types of information. When it comes to the medical field, a social security number is always somewhere in those records as it is something that is frequently asked for. With criminal justice, evidence or data collection in digital forensics is where cybersecurity comes into play. While collecting evidence, it is important that all evidence is not tampered with and that there are safety measures set in place to prevent tampering. This could be through encryption or physical security of systems set in place for protection. With accounting, a lot of financial information is recorded and can be stored in computer systems. It is important to protect the systems or software that store financial information because if the financial information were to be stolen, that would mean that attackers would have access to credit cards for example and use this information to make purchases. For management information systems, a variety of different types of information are being stored depending on what business it is. There are some attackers out there who work for another company and are looking for ways to exploit information about the products and services along with customer data of another company to gain an advantage. There are times when these attackers using social engineering to collect information. This could involve tricking employees into giving out sensitive or classified information.&nbsp;<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\">Journal Entry 3<\/h2>\n\n\n\n<p>The four ethical issues that could arise when storing electronic data on an individual are confidentiality, integrity, availability, and inappropriate use for example. Confidentiality is the restriction that is placed on data. The owner is the individual that is always authorized to access this information. This individual can also give other people authorization to their data. Integrity has a lot to do with the trustworthiness of the data that is stored for an individual. It is very important that data does not fall into the wrong hands and has been altered in any shape or form. Once data has been altered, it is no longer accurate and is considered a breach in integrity. Availability is basically when then the data is accessible to the authorized individual. The individual may access their stored data at any timeframe. If services were knocked offline for example, the authorized individual would not be able to access the data. For data to be considered to be used inappropriately, it would mean the business that is storing the authorized individual\u2019s data is using it in some way without the consent of the authorized individual. Before anything, there must always be consent. The business would be breaking their own terms of services if they did not follow it. If terms were broken, then individuals should be able to refuse or opt of services that they did not consent to. If an individual does choose to opt of services and delete their records with that business, the business should be very thorough in their data deletion processes so that individuals who are no longer customers, will not be at risk of any future data breaches. After deleting everything, there should not be a single trace of the individual\u2019s electronic data be left to find. By doing this, the business would look trustworthy which could then raise their reputation.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\">Journal Entry 4<\/h2>\n\n\n\n<p>With the spreading of COVID, the U.S. including many other countries around the world brings more risks to cybersecurity. Since many countries are practicing social distancing, a lot of people have begun operating things at home through their own computers. There are many problems with this. One of them is that employees are accessing business resources through their homes which makes it easier for attackers to gain access to sensitive data. Although some businesses have already allowed their employees to work from home before COVID started, these businesses have already developed a stronger security for its business network. Since a lot of other businesses have not yet allowed their employees to work from home, their security measures might not be as good the other businesses who having already been doing this before COVID. Because everyone suddenly has to practice social distancing, those businesses are forced to change how they operate without much time for preparations. Because they are forced into doing something unprepared, they most likely do not have a strong security system to set in place. Since many people are forced to go out less, this means that people will mostly likely be spending most of their time on the internet because they most likely have nothing to do. This could be a bad thing because individuals might come across more scams or links that contain viruses on them. Fashion is presently a popular topic. Because people are not able to go to a physical clothing store, they will most likely buy more clothes at an online store. Since there is COVID, attacker will most likely take advantage of this pandemic to scam people into buying from their online clothing stores. Creating fake online clothing stores is a way for attackers to steal and use debit or credit card information.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\">Journal Entry 5<\/h2>\n\n\n\n<p>Letters in the word CYBERSECURITY that lists legal ways to make money in cybersecurity:<\/p>\n\n\n\n<p><strong>C<\/strong>reate app that allows users to add encryption to other files or data stored in their devices<\/p>\n\n\n\n<p><strong>Y<\/strong>ouTube videos on recent cybersecurity events or incidents<\/p>\n\n\n\n<p><strong>B<\/strong>uy websites so that business can advertise cybersecurity services<\/p>\n\n\n\n<p><strong>E<\/strong>nter easy to understand terms of services which could help increase customers<\/p>\n\n\n\n<p><strong>R<\/strong>emoval services<\/p>\n\n\n\n<p><strong>S<\/strong>ell custom made device or hardware that offers strong security<\/p>\n\n\n\n<p><strong>E<\/strong>xport and sell custom made cybersecurity devices or hardware to other countries<\/p>\n\n\n\n<p><strong>C<\/strong>reate an app that alerts users of any type of breach or intrusion<\/p>\n\n\n\n<p><strong>U<\/strong>pgrade current hardware which could be like making an investment to offer better services<\/p>\n\n\n\n<p><strong>R<\/strong>emodel cyber-policies (not exactly earns money, but could help prevent some financial loss)<\/p>\n\n\n\n<p><strong>I<\/strong>ncrease services offered through a business<\/p>\n\n\n\n<p><strong>T<\/strong>each employees about social engineering<\/p>\n\n\n\n<p><strong>Y<\/strong>ouTube videos on the best security measures or software protection systems to use<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\">Journal Entry 6<\/h2>\n\n\n\n<p>Cyber technology has created workplace deviance when individuals join an organization just to hurt it. There are people out there who despise certain businesses because of products and services or some type of belief for example. Because they despise the business so much, they would resort to joining the business in order to destroy it from the inside. These types of attackers could manage their way around through social engineering which involves tricking other employees to reveal sensitive information or even provide authorization. Once an attacker successfully infiltrates, there a number of things they could do. They could steal financial information, destroy records, or sell information to other competing businesses for example. A business could even lose their reputation because their customers might think that the business is hiring just about anyone without doing a proper check if word gets at that one of the employees were doing all these things. This is why it is important to train employees. Employees train should include teaching employees be aware of deviance in the workplace. They should be trained to spot and avoid emails that are considered phishing. Once someone successfully infiltrates a business, they have the contact information on the employees they work with, which means they could send out anonymous phishing emails which would have links containing a virus that could infect a system. The infection could spread to the whole network in the business, and everything would fall into the hands of the attacker. When employees change their passwords, it is important that there are requirements that make the password complex. Once an employee creates a password it is important that if they do decide to write it down, they must put it somewhere safe and secure instead of leaving it out in the open for others to see.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\">Journal Entry 7<\/h2>\n\n\n\n<p>There are many costs and benefits to developing cybersecurity programs in a business. One of the benefits is that there will be an increase in customers when they know that a business is serious about protecting sensitive information. A secure business is a business that customers will most likely trust and wouldn\u2019t mind spending a little extra for if it means their information is protected by strong security. Another benefit of cybersecurity programs is that there are policies created to ensure security. One of these policies could include planning ahead for certain types of incidents. Once those incidents occur, employees would know how to react and waste no time in resolving issues. Not only does it save a lot of time, but it would also save the business and its customers from damages. Even if there were damages, it would be a lot less than it would have been if the business was unprepared for the incident. One of the downsides to developing cybersecurity programs are the actual costs to implement better security. Of course, businesses have different purposes, this means that the programs and policies created will depend on what type of business it is. This means that the business will have to go through trial and error to figure out what works best. They need to test their policies multiple times to ensure they work as intended. There could also be a lot of research involved to find threats and plan against them. Even the equipment itself can be very expensive. Storage lockers, intrusion detection systems, and other types of software are some of the things that are usually spent on. Although it can be costly to implement a strong cybersecurity program, in the long run, it would be a good investment because attacks or breaches would be less devastating.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\">Journal Entry 8<\/h2>\n\n\n\n<p>When it comes to telling whether your computer is safe or not, it can sometimes be very difficult to determine as most times your computer might work completely normal while it is infected. A lot of the malicious code out there today is programmed to stealthily go through people\u2019s systems. Although it can be difficult to tell whether your computer is safe or not, there are still some protective tools or measures can do to protect themselves. One of the things an individual could do is to install anti-malware programs. Not only can these programs scan your computer for any malicious program or codes, but it will also aid it removing them from your system. It is very important to scan your computer from time to time as you may never know if your computer is safe. Not only are ant-malware good for removing malicious programs, but it also helps in cleaning out the rest of your computer if you are running low on space. The reason that a computer could be performing slowly find because a user has a lot of things cache. It is important to clear out caches now and especially if a user is no longer using a service or application for example. Sometimes a cleaning session leaves your computer running more smoothly than before. A good protective measure is to avoid clicking on links that you are unsure about. This is very important as some links will contain viruses that can infect your computer. Some websites are duplicates of an official website. It is important to correctly type in the correct website name as one letter off could mean visiting a duplicate website that was created to steal sensitive information. If a user frequently visits a site through Google, they might not pay attention to the URL link that they click on.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\">Journal Entry 10<\/h2>\n\n\n\n<p>Cyber engineers are very important when it comes to making cyber networks safer. They make networks safer to access by discovering new ways to make data transfer safer. A tool such as Wireshark can be used to monitor data transmission on a network to ensure that it is secure. This could be through packet analysis, which can be used to see if some of the data being transferred is encrypted and not shown in plaintext. Sensitive data should not be transmitted in plaintext as this gives attackers the opportunity to intercept messages and have access to data that does not belong in their hands. Some of the information could include business data and so on. Cyber engineers can use Wireshark to analyze and come up with possible solutions that make data transmission more secure. They could look at the network at decide what protocols to allow or block depending on what type of business they are working under. Another thing cyber engineers can do is set up fake networks for that bait out attackers. They could use the bait to learn and understand more about the methods that attackers use. This is very useful information as engineers can use it to implement better security for their actual network. This also a good way to set up a plan ahead of time so that they would be prepared for any future attacks that may occur. Engineer could even show other employees what they should do before sending out messages. They could show them things like how to encrypt their messages so that they aren\u2019t sent out in plaintext for attackers to see. Once an attacker steals a plaintext package, they could alter the information on it and even request a payment made to them instead of payment towards the original intended recipient.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\">Journal Entry -2<\/h2>\n\n\n\n<p>Three ways that computer make world safer is that it offers a more security protection of sensitive information, it offers safer communication, and it offers convenient access to information from anywhere. Computers offer safer protection of sensitive information because people no longer need to rely on writing things down on a piece of paper which could easily become lost or stolen. Computers allow users to type things down in a document for example and add an encryption to protect their information. In order to access the information someone would need to be able to enter the correct login credentials. Computers offer safer communications because people can have meetings at home through Zoom for example. Because of COVID, school has made students learn at home through online meetings. This makes things safer for students because they won\u2019t be able to spread COVID if they can\u2019t meet physically. Computers makes the world safer by offering convenient access to information. Convenient access can be important if a route to certain place was off limits due to floods or earthquakes for example. An employee wouldn\u2019t have to risk their lives traveling through dangerous areas when they have access to a secure work network. Three things that computers make the world less safe is protection of sensitive information, cyberbullying, and scamming. Computers make storing sensitive information harder as attackers have a number of ways to breach into a system through hacking and social engineering. With computers there is now cyberbullying which can be anonymous. This makes the world unsafe because people can be cyberbullied from anywhere around the world. Cyberbullying is very serious as it could lead to suicide. Computers can be unsafe because it gives scammers an opportunity to make profit off someone who is not up to date with present issue or someone who isn\u2019t tech savvy. This is a problem because people are making purchases towards fake services.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\">Journal Entry -4<\/h2>\n\n\n\n<p>Cyber technology impact interactions between offenders and victims by making things anonymous from the offender\u2019s end. Cyberbullying is a very serious problem in modern day society. It is something the leads to victims committing suicide. Offender can harass anyone from anywhere around the world. Offenders could even pretend to be someone else in order to cause more mental stress on a victim. The person they impersonate could be someone a victim loves or looks up to for example. When it comes to impersonation, the victim is not the only one who suffers, the person that is being impersonated is affected as well. Impersonation can ruin the reputation of people who did not actually harass another person through online posts. Social media is the platform where a majority of cybersecurity takes. Even celebrities can be affected by cyberbullying as there will always be fake rumors that are spread around on the internet. There will always be someone who aims to ruin the success of others either for personal gain or simply out if enjoyment. Cyber harassment is not entirely started with hateful degrading comments. There are also photo-shopped images of people doing sexual acts which count as cyber harass. With everything being anonymous online, it is very hard to determine the identity of the offender as they most likely use multiple devices and accounts. Offenders can even force victims to do certain things for them while threatening to release sensitive information or photos out for the public to see. Some of these forced actions can even push people away from each other as a victim will most likely care more about their secrets getting out. Since everything is anonymous, offenders feel safe to behave however they want when they know that it would be difficult to track them down. They abuse being anonymous to harass others and make a profit for example.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal Entry 1 The reason that I am interested in cybersecurity technology is because technology is a large part of everyday life. Technology will continue to grow far into the future, and with that it in mind, new types of risks and issues will rise alongside this growth in technology. Since I spend most of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/m\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":20787,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/m\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/m\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/m\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/m\/wp-json\/wp\/v2\/users\/20787"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/m\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/m\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":327,"href":"https:\/\/sites.wp.odu.edu\/m\/wp-json\/wp\/v2\/pages\/133\/revisions\/327"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/m\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}