Compared to the per-internet period of history, cyber technology has dramatically altered the interaction between offender and victim because of the increased anonymity between the two groups. Over the internet criminals may defraud, terrorize, and steal from people who they don’t necessarily know, and very well may have never met. They see a name,…
Journal Entry #6
System engineers make cyber networks safer by building trustworthy systems. They must balance stakeholder needs and mission objectives with security measures that protect the involved information systems, data, and technological capabilities from ongoing, emerging, or potential threats. NIST SP 800-160 describes a trustworthy system as one that meets specific security requirements. These requirements will…
Journal Entry #5
How can you tell if your computer is safe? When I began writing to answer this question, I initially thought it would be fairly simple to answer, but the thought process it has involved leads me to believe this is the most important question we’ve yet had to write about in this class. If…
Journal Entry #4
“If it were measured as a country, then cybercrime would be the world’s third largest economy after the U.S. and China” (Cybersecurity Ventures, 2022). Businesses today are under ever-increasing pressure to adopt an adaptive cybersecurity profile to protect revenue, both from cyber-theft and from customers and business partners leaving to do to business with…
Journal Entry #3
Auguste Kerckhoffs’s principle states “In assessing the security of a cryptosystem, one should always assume the enemy knows the method being used.” While you should assume that the enemy, or an outsider with malicious intent, knows the methods being used, certain authorized employees will certainly know the methods being used, which creates a vulnerability if…
Journal Entry #2
Four ethical issues that arise when a company or organization stores electronic information about individuals are: Who within the organization should have access to that information? How long should that information be retained within the company? Should any or all of that information be made available to third parties for sale or public use?…
Journal Entry #1
I’m interested in cybersecurity technology because cybersecurity is a field that has applications in all other professional fields and industry sectors, and I find that to be unique. Cybersecurity considerations impact nearly every aspect of the world we live in today. Our financial data, personal health information, personal photos, personal communication with friends and family,…