Why are you interested in cybersecurity technology?
To answer the question of why I am interested in cybersecurity. The world is constantly growing and evolving. Something new is being introduced each day. Whether it is idea concepts or inventions for business and technology growth, the world is full of new growth and ideas. I always found the growth of technology interesting. It is always interesting to see what is going to happen next. For example, many types of devices such as phones, laptops, iPad, apps, games, and systems are constantly being produced. Not to mention the operating system and benefactors that run off technology. However, once many of these systems or devices are in use, they in some form or fashion connect to an internet or Wi-Fi source. Whether you are using the internet browsing the web or on apps such as Instagram, Twitter, or Facebook, etc… With the rise of technology also comes the need for security and protection for these devices, programs, and systems. Not to mention, many businesses need a good cyber security protection system to help efficiently run their business and be ahead of cyber-attacks and hacks. Cyber security is needed in all industries. I believe one of the biggest things leading to my interest in cyber security is the broadness of the subject. In the near future, all industries will require the need for cyber security, IT, or computer science in some form or fashion. As we move forward to the future the use and need for technology are steadily on the rise. Technology is used every day in business, from the use of computers or other devices and systems. Such as the transaction system used when making purchases etc.…with the constant growth of technology and its use, it also comes with the responsibility to protect yourself, companies, and clients as information is constantly passed through software systems every day. That is where cyber security comes in and plays a major part. Cybersecurity is beginning to be needed and used every day in all types of industries. The opportunity in the computer science / cyber security field is very broad due to the importance and need surrounding the subject. The need for cyber security professionals is only continuing to grow due to the growing need for security for digital protection, as the digital web continues to grow, and the threats attached to it.
Entry 2
Select 4 other majors offered by Odu and explain how they relate to cybersecurity
For the first major, I chose business. I chose business for one of my choices because cyber security complements one another As technology and the web continue to grow so does business. Cyber security is needed in business because companies and organizations have a responsibility to protect their systems and programs and all the information about the organization whether it is employees or customers. However, with everything going on and the constant growth in technology, it can be a challenging job, that is where cyber security comes into play. Cyber defense allows businesses to function without the worry of their systems getting hacked or threats arising. Whether it’s protecting consumer or employee information or sensitive private information in general.
Next is IT I chose IT because I believe in some ways cyber security and IT go hand and hand and deal with some of the same categories and overlap each other in a way. It focuses on a broader aspect of security, managing information, computer systems, and technical skills. It focuses on the computer system as a whole, protecting it from any threat. Cybersecurity has more of a focused specialized role. In cybersecurity, you are protecting and managing systems, software, hardware, or any digital technology online that the organization may have in use from any malware, cyber threat, or attacks. Even there responsibilities are similar they may differ in range.
Then, we have engineering I chose engineering because like the the others chose cybersecurity and engineering complements one another. For example, in engineering, there are a lot of systems, machinery, and equipment and with so many liabilities and assets at stake increased risk of threats and attacks. This is where the need for cyber security protection comes in. Cyber security provides the required protection in the engineering field when dealing with delicate systems, services, and machinery.
Lastly, I would choose health administration / political science I chose these because of the growth of technology and services online and the use and growth of technology in the health field. A lot of customers’ and patients’ information is stored in medical files which serves as a cyber risk. This is why certain laws were brought about such as U.S Compliance Laws – Health Insurance and Accountability Act (HIPAA) security rule. Which provides protection for consumer/patient information. Cyber security serves as a barrier to consumer client information.
ENTRY 3
Describe four ethical issues that arise when storing electronic information about individuals.
Four ethical issues that may arise when storing electronic information are privacy, confidentiality, security, and accessibility.
First, ethics can be defined as one moral or principles and standards that they hold themselves accountable to or the behaviors they have toward others or a situation.
First, we have privacy which can be defined as one right to be with one’s self ( the right to be alone)to have control over and be able to protect one’s possessions and personal space, and not be watched or observed without permission or the person’s consent. For example, not being watched online or doing free time. Keeping yourself and your devices free of observation. Next, you have confidentiality which is the expectation that all private information and communication is only available to those that it is intended for and authorized to see it
For example, some send a msg via text is more private than an announcement made in a group chat. Confidentiality allows a message or information to be available only to those intended to see it. Then you have security which is the concept of securing and protecting systems, assets, information, and physical property from the risk of threats and attacks. As technology develops and grows so does the potential possibilities of risk and threats. When dealing with such complex systems security is essential to navigate and protect peoples and organization privacy and information. Last we have availability meaning that a person or organization is able to have access to information and communication whenever use is required or needed in a timely manner without hold up or restrictions. For example, an employee has access to information needed to complete a task from work when needing to retrieve it without hassle or restrictions in a timely manner.
ENTRY 4
Compare the cyber risk in the U.S and another country
The cyber risk in the U.S and other country
Those no questions cyber security has become a major of discussion and the center of the world’s debate. Lately with all the cyber attacks in recent news. Along with the constant growth of technology and the web, many countries have begun the race to be cyber secure. While researching studies show the United States ranks high and has invested a lot of research into the cyber space becoming one of the cyber leaders of the world. On that list along with the United States, you also have EU nations such as the UK, Finland, and Russia and APEC countries like China at the top of the list. With countries such as Iran, Algeria, Tanzania, and Pakistan at the bottom as the least secure countries. While the United States may have been leading in cyber defense and research it also has the risk of the most cyber attack with cyber crime constantly growing. The United States suffers from the most attacks due to the high use of devices on the web, apps, and technical advancements. Many may think that the attacks are foreign base however most of the cyber attacks in the United States are homeland base and are done from the United States. With () states (“ )Due to the constant growth and rise of organizations, companies, and small businesses and their use and transition to being technology and web-dependent. This leads the United States to the rise and possibility of threats and attacks on those corporations and small businesses making them vulnerable if they are not cyber secure. In recent cases, companies such as Yahoo, Capital One, MGM, and more to name a few were the target of a cyber attack resulting in the loss of millions of dollars and users’ information. It is to mention the many attacks on people’s devices. This goes to show it’s always room for improvement. Many attacks stem from telnet and phishing attacks. With an individual attempting to take an individual’s or organization’s systems or devices. Although the United States may be one of the most secure nations in cyber security it certainly suffers from the most risk and threats being home to some of the biggest companies, organizations, and small businesses along with citizen use of technology and development.
ENTRY 5
Use the letters of the word cybersecurity to list legal ways to make money.
CISCO
YouTube tutorial
Blockchain development
Entry-level cybersecurity position
Risk management
Security Architect
Engineer system specialist
Cloud security analyst
Understanding computer systems and networks
Risk analysis
Intrusion detection
Technical director
YouTube development
Entry 6
How has cyber technology created opportunities for workplace deviance?
Cyber technology has created opportunities for workplace deviance in a few ways and concepts. Whether it may be accidental or intentional. For example, someone may access company resources and information or attempt to access unauthorized information during their free time or away from work in order to benefit them personally. Employees or businesses may misuse customer personal information or not properly protect or secure leading to cyber threats or attacks. An article from loss prevention media.com stated “Examples of cyber deviance include excessive personal use of the internet during work hours, spreading rumors or sharing inappropriate content (e.g., online pornography), unauthorized access to confidential information, and the misuse of company systems or data. Though they may appear benign or trivial on the surface, these counterproductive employee behaviors can cumulatively lead to significant financial loss and deterioration of organizational culture, especially if the acts inadvertently support cyber criminals”. ( Jones,2023). Other complex forms of deviance are Organizations and private and public sectors such as hospitals may fail to properly secure clients’ personnel and information. For example, in recent times regulators have passed laws and guidelines for businesses and large organizations public and private such as hospitals. For example, in class we went over The Health Insurance Portability and Accountability Act (HIPAA) Security Rule establishes a national set of minimum security standards for protecting all electronic private health information (ePHI) that a Covered Entity (CE) and Business Associate (BA) create, receive, maintain, or transmit. The Security Rule contains the administrative, physical, and technical safeguards that CEs and BAs must put in place to secure ePHI.
There is different types of workplace deviance whether it may be accidental or intentional there’s no doubt there are different form of deviance some more serious than others.
Entry 7
What are the costs and benefits of developing cybersecurity programs in business?
To begin developing cybersecurity programs can sometimes be expensive depending on the size and complexity of the business or organization for example you have the engineering or health field such as hospitals which would be more complex and expensive than developing a small business cyber security. However, the benefit or development the proper cyber protection is worth it when dealing with such a technology-based time period. Also, with the possibility of threats and attacks rising. On average according to Atlantic-it.net which stated “On average, companies spend around 10% of their annual IT budget on cybersecurity and about $2,700 on average per full-time employee. So, if your business has an IT budget of $3 million, you’ll likely spend $300,000 on cybersecurity costs”.(Atlantic-it. net,2023). According to Alan Tic larger organizations with larger numbers of employees and equipment systems on average spend 10 percent of their IT funds on cyber security. However, as stated before that may not always be the case. Businesses can start Developing cybersecurity programs just by simply keeping their systems up to date and following the proper NIST framework, maintaining systems, services, and programs. Also, most importantly securing and providing the proper protection of information and data. Especially when dealing with customers, clients, employees, and patients’ personal information. Just by simply doing these things helps a business develop a better cybersecurity program. The benefits of developing a better cyber security program are worth the effort. By making doing so you reduce the risk of a threat or attack on your business. Also, its systems and programs are better protected from malware, threats, and attacks. For example, just keeping your devices and systems updated and maintaining, systems and programs or whatever technology your business is based on reduces the risk of malware or a successful attack happening. Although there are more complex and effective things that can be done. it is always good to start somewhere. Protecting the base, device, and systems from malware and threats is a great start.
(n.d.). Cybersecurity Costs for Small Businesses. https://www.atlantic-it.net/cybersecurity-costs-for-small-businesses
Entry 8
How can you tell if your computer is safe?
To start one of the first things you can do is to pay attention and observe how your computer is running and functioning. For example, watching for suspicious or unusual activity, whether it is lagging (running slower than usual), are systems, cameras, and apps activated and running without you using them. Also, missing or excess information and system crashes or restart. These can be a sign of viruses or malware on your computer. However, that may not always be the case. Furthermore more when dealing with device or computer failure or malfunction. One of the first things someone can do is restart there’s device or computer, and completely restart the system. Next, update their device or computer to the recent release. Use proper antivirus software to protect from viruses and malware. A person should also change their passwords and form a better and stronger security password. Along with using lock keys such as 2 Factor authentication which provides an extra layer of security for their computer or devices. Establishing the proper protection on your computer or device is important if you to reduce the risk of something or someone gaining access to your device and the information along with it. The average person spends 3-5 hours on their phone, computer, or device a day raising the risk of a cyber threat. Not to mention the U.S. is one of the countries at cyber risk despite their efforts and high ranking of security. A threat or attack can happen in many ways and forms. For example, you have phishing, remote attacks, physical attacks, crypto jack, internet of thing attacks, viruses, data breaches, and more. With the constant growth and use of technology and the World Wide Web such as the Internet of Things comes the complexity of protecting its users and using them effectively. That is why it is important for one to observe and maintain their devices and get their systems updated with anti-virus software for starters. Also, be on the lookout for phishing, viruses, and malware and establish a secure password to reduce the risk of an attack on their computer or devices.
Entry 9
Describe three ways that computers have made the world safer and less safe
To start in today’s time computers and technologies have become a base center for the world as a whole. Computers and technology grow and are used every day Whether it be for recreational use or solving world dilemmas and problems. However, just as it has its pros it also has its cons and is sometimes misused for the wrong purposes and intentions. Which sometimes can result in potential problems, some bigger than others. furthermore,
Three ways computers have made the world safer are by improving communication/mobility, advancing science and medical practices, and allowing for better patents and designs. On the other hand, the three ways computers and technology have made the world less safe are they improve the risk of attack and malfunction, reduce privacy in the world, and may become too complex, along with reducing human physical fitness and human interaction.
First computers have made the world better by improving communication and mobility. With the growth of technology and the web such as the Internet of Things and apps such as Facebook, Twitter, X, and Skype being able to communicate, connect, and spread information has been simpler than ever. The computer has helped the world shed light on national problems that going on in the world that we may not have known without computers or the internet. People are now not just relying on the news for information whereas you have a variety of points of view and opinions, you are able to get a clearer look at what’s going on in the world. Next, advanced information, science, and medical practices. With the growth and advancements of computer and technology researcher were able to take advantage and speed up and advance their research on a particular matter such as processing information better, and creating medicine and cure for medical conditions. Also creating better medical equipment such as X-rays, CRI, monitors, and machines to help patients recover quicker. It also allowed for scientific advancement. Third computers and technology improved technology designs and patents that have altered and improved the world’s way of living. For example, it helps create better patents for everyday things we use such as vehicles, buildings, and everyday technology. Let’s look at the Volkswagen for example ranking as one of the safest cars to drive due to its design and how it was made. The computer has a big part to play in creating the finished product. That is just one example of many. However, although computers and technology are used for a lot of good, you also have situations where they can be misused or too complex and create and bring about problems. First, one way that computers and technology have made the world unsafe is as it grows, more people use it and it grows too complex. You have the risk of malware, threats, and attacks. That is why it is important to maintain and observe your computer or device for threats and always keep your device updated with the proper anti-virus software. Next is reduced privacy in the world and the complexity of computer systems. As technology grows it becomes more complex and difficult for some to use, leaving them vulnerable to malware, threats, and attacks. Another thing with the complexity it makes technology more expensive such as health machines and cars etc. Nowadays we seem we live in a time where nothing is private, especially with social media and online. Much of the time people are left vulnerable to risk without knowing. It could be s simple social media post or clicking the wrong link by mistake. That is why it is always beneficial for someone to educate there self on exploring technology and the web properly and setting the proper protection to reduce risk. Lastly, the third way computers have made the world safer is by reducing physical activity in the world. People are spending more time on their computers and devices. Which in the long run can become unhealthy.
Entry 10
How do engineers make cyber networks safer?
There is no question that the cyber network can become difficult to manage at times and require hands-on attention to establish a safe space
Engineers make the network safer by establishing a defensive system for cyber networks by monitoring and observing the system for any threats or attacks before they arise. Engineers establish proper defense by setting proper framework and security to reduce the risk of threats by doing so they protect the organization’s cyber network from the risk of bugs, malware, threats, and attacks. Engineers are in charge of keeping cyber systems up to date and ensuring the proper programs are running to prevent risk. Along with installing the proper firewalls and configuration for system security. Engineering plays an important role because it ensures that the organization’s systems are safe and properly managed by monitoring and updating systems manually and regularly. Along with setting up password and system protection. Engineers provide a safer work atmosphere by ensuring that the system and everyone using it along with their devices are protected while using the network. Along with creating cyber networks, establishing protection while using the network, and being great problem solvers engineers also are able to pinpoint the attacks. Along with where it came from, how the attack happened, and what to do to prevent it in the future. Engineers constantly run tests and applications to see what needs to be changed or updated they have a big input on a company that is able to run smoothly and efficiently. For example, if something happens with work computers and systems crash they are responsible for solving the problem and figuring out what caused it. The business is not able to efficiently run without the problem getting solved. This is just one of many reasons why engineers are important factors in a business running efficiently and effectively. It is also important for engineers within the firm to work alongside the IT, Human Resources, financial, and other departments to ensure full stability within the organization and stop problems before they arise or cause further harm. Coherence between the departments is important. They must communicate regularly and update and debrief each other on current situations within the organization. It is no surprise how cyber technology and engineer can play a big role in an organization’s development along with the other functional departments mentioned it is a crucial aspect to the stabilization of an organization along with the other functional departments coming together to form an effective organization. However, at the end of the day, cohesiveness and communication are key for organizational development along with good technical advancements and people who know how to work the technology such as engineers.
Entry 11
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
o explain the overlaps between criminal justice and cybercrime and how these overlaps relate to the other disciplines discussed. First, according to the writer at UMASS criminal justice can be defined as “
Let’s start with a concise criminal justice definition: “Criminal justice is the structure of laws, rules, and agencies designed to hold criminals accountable for their misdeeds and help them to restore their victims as much as possible,” explains Lizbeth Meredith, former juvenile probation supervisor, and victim …(UMASS GLOBAL, 2023) However, cybercrime can be defined as Cybercrime is any criminal activity that involves a computer, networked device, or a network. While most cyber crimes are carried out in order to generate profit for the cybercriminals, some cyber crimes are carried out against computers or devices directly to damage or disable them.
criminal justice and cyber security overlap each other because they both deal with criminal activity and come together to try to solve crime. However, the recent boost in technology over the years led to the boost of more cybercrime over the years. With new technology constantly getting introduced to the world it raises red flags that people are starting to use technology more and more each day according to the class reading individuals are starting to be on their devices for more than 11 hours each day raising concern by boosting criminal activity online. Criminologists have come together in the hope of finding a better understanding of cybercrime so that they better characterize it as far as what category of crime it falls under. Whether it can be categorized as white collar, international, common crime, etc… or have its own category of cybercrime itself.
With Criminologist Peter Grabosky stating
“whether cybercrime is “old wine in new bottles” or “new wine,” while David
Wall (1999) questions whether the behavior is “new wine” in “no bottles.”
Another question to ask is whether cybercrime is a “wine cellar,” with various
categories of crime (or wine) captured under the broader domain of cybercrime. (Peter Grabosky, 2001).
(n.d.). Using Labeling Theory as a Guide to Examine the Patterns, Characteristics, and Sanctions Given to Cybercrimes. https://drive.google.com/file/d/1HO4NqLoZzpf9pzIvBAYXfT2rCeuhEttI/view
(n.d.). What is criminal justice? Investigating its purpose and professions Print Article. U MASS GLOBAL. https://www.umassglobal.edu/news-and-events/blog/what-is-criminal-justice
Entry 12
How does cyber technology impact interaction between offenders to victims
To begin technology is continually growing and developing changing how we view and move in the world today. Due to the rising growth of technology and things such as the internet and the World Wide Web, the world is more connected than ever with so many different ways to communicate and use the internet and other rising technologies. With that being said with the growth of technology and the web also come the growth of information and accessing it. Information is available and easier than ever to access with proper information. Due to the change and technology growth of technology comes with changes in people’s way of living and habits. For example, since the internet has been released so have apps such as Facebook, Meta, Twitter, Instagram, and many other which has millions or not billions of user combined passing along information. Not to the increase in online shopping and purchases. We are in a time where you don’t have to leave your house if you need or forget something, just simply pick up your phone and order it with your phone which probably already has the person’s personal information stored. Not to mention, everyone’s personal information somehow being stored in some type of computer database whether it is hospitals (medical) courts, banks, etc. With that, the recent rise in cyber technology and accessibility of information may have negative effects such as people trying to take advantage and victimizing the opportunity. If your information or devices are not properly protected it leaves the risk of your system and device getting hacked. There are many different types of threats to look out for such as phishing, malware, viruses, and bugs to name a few. With cyber technology and security still developing and emerging leaving a strain on individuals and officials trying to understand cybercrime. Due to the complexity and constant change in cyber technology individuals and officials have had a hard time understanding and establishing an effective solution to the matter and its concept. The thing about cyber crimes is that an individual may not know it happen tills days or months later. Along with who, what, why, and how.
Entry 13
How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
To begin cyber technologies are continuously growing, enhancing and new features which can make it hard to set up and establish a proper and stable defense system or senario. Especially with the variety of different type of attacks such as phishing, virus, malware and many other cybers threats and way systems are attack. However, through out the course we went over and listed a few security measure a person or organization can take to better secure their devices and systems from a cyber threat or attack. To list a few,
1. Briefly define each of the three members of the information security triad. – confidentiality- designed to prevent unauthorized disclosure of information, integrity- protection against unauthorized changes and availability-the protection of a system’s ability to make software system and data fully available whenever a user needs it. (CIA) put together the concepts are considered the triad 3 principle of information security.
- What does the term authentication mean? – authentication is the term use when verifying the identity of a user for a device or process.
- What is multi-factor authentication? – multi-factor authentication is a term use for the security process that require more than just a password for a login process for security reasons. x fingerprint voice activation etc.
- What is role-based access control? – role based access control is term refers to the level of access an employee has within and organization. Network access is restricted based on person role.
- What is the purpose of encryption, and fundamentally how does it work? – encryption secure digital data by encoding it using mathematical algorithms. Making the original data unreadable to un authorize users or viewers
- What is pretexting and how does it represent a threat in the Cybersecurity landscape? a pretext is a made-up story or scenario made up in order to get the victims trust to get their money or data is a threat because it can be harmful to victim if attempts are successful and could lead to and cyber-attack.
- What’s the point in backups & what are the components of a good backup plan? – the point of a backup plan is to create a copy of the primary source in case of failure or loss of data system. the components of a good back up plan are on and off-site backups, back up archiving and disaster recovery and so forth.
- What is a firewall? – a fire wall is a network security system device that monitors and filters all incoming and outgoing network security traffic.
- Discuss various types of Firewalls. – five type of firewalls is application- level gateway, stateful inspection firewall, next generation firewall, circuit- level gateway and packet filtering firewall.
- What does the term physical security mean and how does it apply to Cybersecurity? physical security is the prevention of loss of data information. protection personal hard or software from physical action. It applies to cyber security by protecting organization and enterprises from physical security harm.
Leave a Reply