Week 5 – Journal Entry

Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it.

List of motives:  Entertainment, Political, Revenge, Boredom, Recognition, For money, Multiple reasons

1.  For money – easily the number one reason hackers do what they do; more money equals more freedom, more opportunity, but also could equal more problems.  Mid-level criminals earn upwards of $900,000.00 on average, annually.  Most people won’t see that type of money in their lifetime, so earning it in a year also gives hackers a lot more power.

2.  Multiple reasons – this motive encompasses a broader variety of motives, so it would be safer to put it in the number two spot; this could encompass all or a select number of the motives from the list.

3.  Recognition – hackers may want to be recognized depending on the reputation of the entity they are hacking; hacking is very competitive, so receiving validation for their work is likely very important for establishing reputation within their own respective communities.  It could even increase the adrenaline/thrill they get from the act itself, not more thrill than getting paid though.

4.  Revenge – there are some theories that say individuals will commit cyber offenses based on impulse, and anger-/revenge-motivated actions are typically results of impulse.  Impulse is typically going to be a stronger force than boredom, so I ranked it above.  This motive could technically encompass political beliefs as well as some outside force/entity could be involved in politic actions against a party that the hacker may be involved with causing that same revenge-oriented impulse.

5.  Political – I ranked this here only because I don’t hear or see much related to political-related hacking/attacks, but I believe it still occurs more often than the two motives below.

6.  Boredom – similar to entertainment, there are plenty of hackers that commit malicious acts because they are bored, but here there are far fewer that do it for reasons of boredom compared to the reasons above.  A tiny bit of incentive for committing the act is satisfaction, which could provide a little bit more motivation, but still not enough to be more prevalent.

7.  Entertainment – while there are plenty of hackers that do commit these malicious acts for fun, there are far less that do it for fun than all of the other motives listed above; involving some type of incentive for the action provides more motivation to actually commit the act.  Hackers who do it for fun likely are motivated to do so just to say that they could.

The above rankings are based strictly on context, noticeable trends, and personal logic; these are not to be taken as undeniable fact.

Week 4 – Journal Entry

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

Maslow’s Hierarchy of Needs entails the idea that individuals have necessities, existing on a hierarchical level, and as each necessity is fulfilled then the next necessity becomes the focus.  The necessities are broken into groups and then into subgroups as follows:  Basic needs (physiological needs & safety needs), Psychological needs (belongingness and love needs & esteem needs), and Self-fulfillment needs (self-actualization). 

At the basic needs level, my physiological needs such as food, water, and warmth are all (for the most part) met through online means.  I wouldn’t be able to have water or warmth without the portal in which I pay the bills for those utilities; money is needed to pay the bill through the portal, but the fact that it is accessed via the internet makes it a monthly digital experience.  As for food, I usually have it delivered for the vast majority of my meals through online means; I could go into a physical store and get it, eliminating that digital experience, but I prefer to use the internet to do it because it tends to be more convenient for me as of right now.  My safety needs are met the same way, via the internet.  The antivirus program I use, adblockers, browser plugins, etc., are all things I wouldn’t be able to utilize without internet access, and I use them every day.

At the psychological needs level, I don’t tend to use/need technology to engage with friends/family (outside of gaming) on a personal level unless necessary.  But when it comes to the need for/of prestige and feeling of accomplishment, that one is almost entirely met by the technology I use as well as the internet.  I work full-time from home, so my entire job is on the internet, and I would not be able to do it without technology; the better I get with technology and the more I learn about technology, the more it tends to the needs aforementioned because it will almost always increase my level of performance.

Lastly, at the self-fulfillment needs level, my self-actualization needs such as achieving my full potential (including creative activities) is met pretty much entirely through technological means as well.  I do school online using technology to try and be the best I can be and do what I want to do.  Regarding creative activities, I could not meet this need without technology, at all.  I like recording and making videos, and I would not be able to record those videos without software downloaded from the internet or without my PC; and I would not be able to edit those videos or add my imagination/utilize my imagination for the video (photoshopping images, adding other features, etc.) without the internet, technology, or the software I bought and downloaded from the internet.

In conclusion, the majority of my needs are fulfilled through the usage of technology in conjunction with the internet.

Week 3 – Journal Entry

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?

The information available on privacyrights.org regarding data breaches primarily focuses on the preparation for, privacy of, and protection of data from data breaches, built off of information about the effects of data breaches themselves.  One article I read outlines some of the consequences of data breaches on a company or organization, that I believe would be similar (depending on the size of the company and scale of the attack) to the consequences of data breaches of all companies/organizations.  The first consequence mentioned is cost, as cost scales with the size of the attack (number of records compromised) in most cases; cost of a data breach was measured in terms of cost per record.  Next, reputational issues were mentioned; if a data breach is successfully committed on a company/organization, there’s a pretty good chance that it will have negative effects on their reputation.  Unfortunately, it is unavoidable.  Lastly, the initial steps that should be taken in preparation and for protection from these attacks are outlined.  My takeaway from this is that researchers can use the information from this website to perhaps shift or intensify their focus on certain assets of that may be targeted in these cyberattacks/data breaches, prioritize what may be more detrimental to the company/organization of the potential consequences if prevention of the data breach failed, and then maybe implement more effective or secure versions of the precautions mentioned earlier to accommodate.

Data Breach Readiness and Follow-up: Being Prepared for the Inevitable: Presentation to the Association of Information Technology Professionals | PrivacyRights.org. (n.d.). Privacyrights.org. https://privacyrights.org/resources/data-breach-readiness-and-follow-being-prepared-inevitable-presentation-association

Week 2 – Journal Entry

Explain how the principles of science relate to cybersecurity.

Principles of science relate to cybersecurity in multiple ways; problems are identified and investigated, potential ideas or theories are formed as solutions to those problems, those ideas/theories are tested, results are recorded, conclusions based on those results are made and whichever solution was the most effective will be used and expanded on later.  The systematic approach remains the same for the most part, and the ideas are implemented in a way that can be applied to cyber-related issues.

For example:  analysis of data on recent cyberattacks and potential threats could reveal that there are certain vulnerabilities in an internal system.  The threats could be dealt with individually where they are investigated, and ideas are proposed that could mitigate or remedy the threat; the ideas could then be tested in some sort of isolated environment where the effects of the testing won’t interfere with the normal operations of the system; results of the testing are recorded where they will likely be compared in order to figure out the best solution; conclusions are made regarding the best solution that will be implemented and likely expanded on in the future to keep remedying the problem (until it is invalid).  This type of approach could be applied to a multitude of cybersecurity-related issues.

Week 1 – Journal Entry

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

Out of the seven categories of the NICE Framework, I would want to focus my career on the “Analyze,” “Collect and Operate,” and/or “Protect and Defend” areas because I tend to excel in those types of roles.  I thrive the most in these types of positions because, naturally, I want to understand things to their fullest capacity; and it’s difficult to do that at times without performing some type of review or analysis depending on what it is.  All of the aforementioned areas entail reviewing, researching, analyzing; then it takes it a step further in the “Protect and Defend” category with implementation being incorporated into the mix as well which helps to solidify/crystallize that knowledge. The one category that appeals to me the least is “Investigate.”  I don’t believe I would perform at maximum capability in this field, even though it does involve analysis; I don’t believe the data aspect of it is emphasized as heavily which steers me away from it.

ePortfolio Entry #6

How do engineers make cyber networks safer?

Engineers make cyber networks safer in various ways.  They focus their approach to securing networks by gaining a comprehensive understanding of both the issues that need to be addressed and the solutions that could resolve said issues.  In doing this, engineers bring an outcome-oriented approach to securing cyber networks where the focus becomes the security of the system as a whole rather than putting relatively heavy focus on the individual aspects that make up the system security.  Some of the multitude of components that encompass a secure system include ensuring the protection and security of stakeholders, “[identifying] and [assessing] vulnerabilities and susceptibility to life cycle…threats”, implementation of designs that efficiently control asset loss, implementing security considerations that focus on error prevention, “[performing] system security analyses…”, and “[evaluation] of the costs/benefits of security functions and considerations…”

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

The overlap between criminal justice and cybercrime involves the investigation of cybercrimes.  Cybercrimes need to be investigated just like any other crime, but investigating cybercrime is a bit more complicated.  Knowledge of computer forensics, knowledge of the various tools used to perform computer forensics, and knowledge of computers & networks in general is mandatory for the investigation of cybercrimes.  In general, it is vastly easier to remain anonymous committing a crime online than it is to remain anonymous committing a crime in real life.  The use of techniques like encryption, VPNs, and fake identities are just a few things that make it a potential challenge to figure out the identity of an attacker.  And since technology is advancing at such a rapid rate, staying up to date with and having knowledge of the aforementioned is a necessity when investigating cybercrime. 

This overlap relates to other disciplines discussed in class, like sociology and psychology, because an understanding of why the attacker is attacking is important in figuring out who the attacker may be.  The attacker could have been hired by another company or they could simply be attacking just because they felt like it.  Having a sense of direction would make it relatively easier to strategize about how to catch them.  Also, understanding who else may be involved is extremely important as the perpetrator may be a group rather than a single individual.  Catching the entire group of perpetrators will likely prove to be vastly more difficult than catching a single perpetrator.  The agency in charge of catching them may only figure out who a select few are, but that still leaves the others to continue their attacks.  Understanding who else may be involved will also make it relatively easier to strategize about how to catch them.

ePortfolio Entry #5

How can you tell if your computer is safe?

There aren’t telltale signs to tell if your computer is safe, and there aren’t security controls that will absolutely guarantee the safety of your computer.  While security controls will make it exponentially more difficult for an unauthorized user to access the data or information contained within, there is never a guarantee that it can’t happen.  There are many ways that you can increase the security of your computer.  Strong passwords and utilizing multifactor authentication methods are the easiest ways to get started with adding an extra layer of security.  Since most peoples’ computers are probably by or on a desk in an office, sitting on a counter somewhere (mainly speaking about a home setting), etc., it’s important that it’s at least a little bit difficult to gain access though the login screen.  This screen can be accessed remotely as well, which makes it even more important for security.  The next easiest is probably some type of antivirus software that regularly scans your computer for any malicious activity (may cost money, may not cost money).  Antiviruses can detect any malicious code that may have ended up in the files on your computer, can detect any potential threats or unsafe downloads from the internet that contain malware, can scan incoming and outgoing emails for malware, etc., that will all aid in the security and safety of your computer.  Next in line are firewalls to prevent certain types of network traffic.  Many of the ways that unauthorized users attempt to access your network can be blocked by a firewall.  Unauthorized network connections, DoS attacks, malicious data packets, network traffic that doesn’t adhere to what you want to let in or out, can all be blocked with the security policies and protocols integrated by and within a firewall.  These three methods are some of the simplest ways in which you can add layers of security to your computer which in turn will make your computer safer, but there is no guarantee that a hacker won’t find a way into the network.

Describe three ways that computers have made the world safer and less safe.

The first way that computers have made the world both safer and less safe simultaneously involves the abilities and opportunities that arose from their actual invention; computers have allowed us to create the internet, the world wide web, and gave us a method of mass communication.  The internet allows us to gain immense amounts of knowledge that otherwise would be unattainable without the internet, a way to connect with others all around the globe to socialize or share information, while also rendering us vulnerable to cyberattacks and cybercrime.  Another way that the invention of computers has made the world both safer and less safe involves general passion and ethics that can go both ways (“good” or “bad”).  With the constant advancement of technology, security controls and measures will advance; as these security controls and measures advance, our way of living that relies heavily on the internet and computers will get safer.  On the other hand, though, this constant advancement of security will bring on more determined groups of hackers; and these hackers will constantly work to stay ahead of the game and find vulnerabilities within these security controls/measure/strategies that may have been left unchecked.  Lastly, involving creations that have arisen from the invention of computers, is the creation of applications and software that are utilized for the unauthorized access and monitoring of networks.  From the programs I have used in labs so far, there seems to be a parallel where the same programs that can be used for unauthorized access and monitoring of a network, could also be used to detect the unauthorized access.  All of the above are ways in which the world has become both safer and less safe from the invention and use of computers.

ePortfolio Entry #4

What are the costs and benefits of developing cybersecurity programs in business?

Developing cybersecurity programs provides a multitude of benefits for a business with the main benefit being the protection/safeguarding of the network of systems and machines being used for daily operations.  A cybersecurity program is typically developed for risk management and is usually developed for the specific needs of the business.  There are some programs that are premade that the business could use, but I don’t believe it’s as common.  The program covers many different aspects, typically starting with risk assessment where potential risks are identified, evaluated based on potential impact on the business, and risk-reduction measures are recommended, but not yet implemented.  The next step in the program typically involves risk mitigation, where measures are taken to reduce the impact of the risks assessed in the before step.  These measures involve risk avoidance, risk mitigation, risk acceptance, risk transference, and once again, the evaluation of the assessed risks.  And lastly, comes evaluation and assurance, where risks are continuously assessed and evaluated, and this step also involves regulatory compliance; regulatory compliance meaning the maintenance of the policies, processed, and controls used to implement and perform the before steps.  All the steps involved in the risk management process are performed in a cycle if that makes sense; meaning, the steps are performed in order and performed again periodically or as needed in the same manner.  Doing this brings a strategic and systematic approach to the risk management process.  And ensuring the network is safeguarded results in a better reputation and increased reliability into play, which could also be seen as a benefit as other businesses will be more likely to collaborate. 

There aren’t too many costs relative to the benefits of developing a cybersecurity program.  The main cost is the actual cost of developing the program, like how much money is budgeted and spent.  The cost could depend on the size of the business and what needs to be protected, and it also could depend on what the company is willing to spend.  A small business may not have the budget for an advanced cybersecurity program, but at the same time, a large business may not be willing to spend what is required for an advanced cybersecurity program as the cost is relative to how much needs to be protected.  There are a lot of elements/factors that go into determining the price that may or may not even reflect the size of the business; it could be more expensive because it is more advanced, such as something that involves PKI.  Cyberattacks can result in a company losing millions of dollars and ton of lost time, so subjectively, the benefits will almost always outweigh the costs of protecting the network in the long run.

ePortfolio Entry #3

How has cyber technology created opportunities for workplace deviance?

Cyber technology opens up a variety of opportunities for workplace deviance.  Through the protection of data with these defense mechanisms and security controls, like the different methods of access control, some employees may have or obtain access to sensitive data.  These employees that have the privilege of accessing this data now have the opportunity to use this data in an unethical or illegal manner.  They may use this sensitive information, information that is not known to the public and would otherwise be unfair to utilize, for personal monetary gain.  This act is formally known as insider training, and it will very likely lead to fines or time in federal prison.  Another potential misuse of sensitive data by employees involves the theft of works that are the product of creativity, formally known as intellectual property theft.  Designing or manufacturing a product that solves a problem for people, while also being unique to the company who came up with it, is important for dominating a specific market.  If the plans for this innovation are stolen and exploited for personal use or even for the use of a competitor, the company is put in a tricky situation.  The company will lose money, lose reputation, lose employees, lose their edge in the market, etc., and the perpetrator, if caught, will very likely be fined, charged, or be put in federal prison.  Both of the above are what I consider to be some of the most severe cases of workplace deviancy that could arise from cyber technology.  A more minor case could be when an employee uses the technology offered by the company, that they are supposed to use only to do their job, for personal use.  This could be pretty much anything, like something as simple as browsing the internet.  This is formally known as cyberloafing and is probably one of the most common forms of workplace deviance that relates to cyber technology.  The emergence and advancement of cyber technology has provided a variety of opportunities for workplace deviance.

ePortfolio Entry #2

Describe four ethical issues that arise when storing electronic information about individuals.

Ethical issues that arise when storing electronic information about individuals can include accuracy, privacy, property, and accessibility.  Data accuracy entails the correct and precise representation of an individuals’ information.  Dealing with the issues that surround the ethics of data accuracy involve the assurance that information isn’t manipulated or tampered with by both authorized and unauthorized users, and security controls are used to ensure that the integrity of the information being protected remains intact.  Data privacy entails the control and protection of an individuals’ sensitive information.  Dealing with the issues that surround the ethics of data privacy involve implementing defenses against attackers and unauthorized users, ensuring that the individuals are aware of how their data is being gathered and utilized, and ensuring that their sensitive data remains confidential.  Data privacy and data property are related in the fact that they both deal with the control of an individuals’ sensitive information or data.  Data property deals with control in regard to the ownership of an individuals’ information and what the individual is entitled to do with their information.  Dealing with the issues of data property are also similar to how issues of data privacy are handled:  ensuring that the individual is aware of how their data is being used, gathered, and ensuring that the individuals’ wishes are respected in regard to both of the aforementioned.  Lastly, data accessibility involves the availability of an individuals’ information.  The individual needs to be able to access their information/data whenever needed.  The issues of accuracy, privacy, property, and accessibility are just some of the many ethical issues that arise when storing electronic information about individuals.

Compare cybersecurity risks in the U.S. and another country.

The U.S. and China face similar security risks since they are both large nations with valuable data/information that attackers want to take advantage of.  Cyber espionage is always a risk for large nations like the U.S. and China as they are some of the most technologically advanced in the world.  Obtaining this data/intellectual property could provide leverage over the nation and pose a substantial risk to the security of the nation.  In doing this, technological advancements could be halted, and economic interests could be compromised.  Insider threats are another significant risk for both the U.S. and China, and there is a higher chance of it happening since they are large nations with several large corporations.  Sensitive data could be accessed or stolen for the purpose of compromising the business or corporation, or it could even be accidental due to a lack of awareness on the issue but poses the same outcome.  Intellectual property could be stolen, the safety of employees could be at risk, the reputation of the corporation could be impacted, many negative consequences could come out of an insider threat.  Cyber espionage and insider threats are just a couple of the multitude of risks that affect both the U.S. and China; but all of them have negative consequences that can hinder the advancements of the nations and cost thousands of dollars to recover from.