IT/CYSE 200T

Journal #1

Since a young age I’ve been slightly advanced with technology. I believe when you are good at something it helps build interest in doing it. Around three to four years old I started with video games and playing fixing any problems on my gaming console. Slowly my family started to ask me to help them with their devices as well such as: Laptops, routers, and phones. It would be as simple as connecting their laptop to the printer, restarting the router, and recovering deleted photos from their mobile device. That suddenly turned into my family constantly calling my name for me to fix the tv, security cameras in the house. Fast forward to high school around freshman year, I realized how the world around me revolved around technology and had an idea what the future would look like. With the future shifting to everything digital it made me think it will be a ton of money to be made in the IT industry. With people being more comfortable utilizing their money online through mobile banking, cash app, and even online investments, I knew people would need some type of security to feel safe. My sophomore-senior year in high school I was one of three students chosen for the STEM program. Eventually, my senior I transitioned into a Student-Teacher and taught multiple classes for middle school to sophomores. Throughout my senior year of high school, I worked for my school by having a help-desk. I would repair Chromebook screens, troubleshoot network problems, and even answer emails concerning computer malfunctions for teachers. Repairing chrome books made me realize I enjoy working with software more than hardware. From a decent amount of research, I realized completing a cybersecurity degree would put me in a great position to have a well-paying salary. My interest in cybersecurity fueled from being challenged in my STEM class and pushing my brain to another level to learn.

Journal #2

Information Systems & Technology, Network Engineering, Business Management, and Criminal Justice are all programs offered at Old Dominion University that relate to Cybersecurity in their own way! Surprisingly all the majors listed above I have a slight interest in, maybe in another life I would choose one of the four instead of Cybersecurity. First Information Systems & Technology and Cybersecurity are obviously digitally based as it does not take rocket science to realize. They have many similarities but, at the same time have just as many differences. They even share some of the same career options (job titles) as each other. The skills required for Information Systems & Technology and Cybersecurity are alike as well such as: problem-solving skills attention to detail, and, a desire to learn! Both majors pay very well and from the looks of it as of now will continue to be in high demand for the present and future! Next, Network Engineering and Cybersecurity have differences from each other but, have the same common goal, which is to defend! Network Engineering is more so focused on protecting the integrity of networks and data while Cybersecurity is more concentrated on protecting internet-connected systems from any attacks. If someone has work experience in Network Engineering their transition to Cybersecurity would not be as difficult as someone coming from a different industry. Both programs are digitally based are great options for someone who enjoy working with firewalls. Following after is Business Management which has a few things in common as Cybersecurity. Working in Business Management comes with high expectations as you may over see hundreds or even thousands employees which is not easy. In Cybersecurity you may over see thousands or possibly tens of thousands of users that need protection. Both programs require communication skills to succeed in their respective field. Lastly, in Criminal Justice and Cybersecurity problem-solving is vital. They both focus on preventing crimes, just in different ways.

Journal #3

Privacy and confidentiality, security breaches, system implementation, and data inaccuracies are all ethical issues that arise when story digital information about individuals. When uploading personal information and documents online most people are suspicious of the outcome. With everything being digital now, it’s easier to do things online (pay bills, renew subscriptions, and even for a US Visa.) At the very least I feel as if you are advertised as a trusted source for users to upload files, confidentiality is the bare minimum. Some travel benefits require you to upload your Passport and Social Security Number, an employee could easily scan your documents digitally and falsify their identity as you! Or maybe even worse sell your Social Security Number and could have your credit ruined. Many different sites sell consumers activity down to the smallest detail you could think of! An employee working for a big company (dropbox for example) could have an exclusive access to user accounts and release private information or potentially sell it to competitors which would be considered not being confidential. Next, security breaches are another ethical issue when storing information digitally which sadly happens everyday. A breach is completely out of users hand unless, they setup a weak password or they shared their password. Most breaches fall on the digital defense team as they are expected and payed to keep the customers information protected. It is not as easy as I made it seem in the last sentence but, is reality for the network security of a company. System Implementation is vital for all companies but, in my opinion startup enterprises. The corporation should be built on a strong foundation from security and reliability. Me personally I would choose the corporation who was been around for awhile and has been trusted and had the least amount of breaches in recent years. A weak system implementation is a lose lose situation for the brand and the customers, both have a ton to lose! How would a consumer know if the business has a reliable system implementation if it has not been battle tested for years already? The thought of a stranger having personal information and pictures is scary. Lastly, data inaccuracies could be as little as having the customers name listed incorrectly as in spelling. Also as big as not having a tier 2 security level that the consumer may have purchased.  Data inaccuracies is a dangerous game to play and would make users question the corporation for being lazy or not having sharp work. The slightest inaccuracy could easily turn into a users profile being misplaced and vulnerable for more mistakes.

Journal #4

The United States is top three for countries most targeted by attackers that alone makes the U.S. stand out compared to other countries. Some sources have the U.S. listed as the most secure cyber country in the world, other have the United States top five. Technology is more advanced in the United States compared to a lot of different nations. Majority of everything is handled online here such as bills, documents, and even work. With private files that are expected to be protected there is still a chance of a breach which makes the U.S. vulnerable. Third world countries do not have to worry about a digital hack as much as U.S. citizens. Surprisingly there are still countries with no internet access. With no internet that means credit cards, Social Security numbers, and other private information has less of a chance of being stole digitally. Their budget for an online defense team would either be low or non existent I would assume. The U.S. on the other hand, just spend 15.6 billion alone on cybersecurity efforts across federal departments and agencies. If a hacker bypassed the U.S. firewalls and other protective tools and breached the grid and chose to shut it down, it would be terrible for the United States government and citizens. This alone would affect some homes’ heating system, AC unit, and refrigeration for food. This would be a disaster and could ruin the economy. Not only would it affect the past things listed but nobody would be able to access their money since bank systems would be down and online banking would be unaccessible. Iran is listed as the second-worse secure cyber country in the world and sources claim they have a banking malware issue as well. Overall, the U.S. is not clear from not being attacked online but, after reading the article on how the United States is number 1 for digital protection helps me sleep better at night.

https://www.broadbandsearch.net/blog/best-worst-countries-cybersecurity

Journal #5

Code website’s for entrepreneurs.

Youtube videos telling the audience how you were successful In the cybersecurity field (eventually would generate revenue from ads)

Buy cybersecurity stocks. OR Bug Bounty Hunter

Ethical white hat hacker.

Remove any viruses and “red flags” from customers computers and mobile devices.

Sell cybersecurity a course to students and entry level employees interested in learning.

Engineer, code the future of secure transactions.

Create a software app that detects suspicious traffic on the network.

Upgrade or update business’ digital protection.

Release a book on cybersecurity industry giving advice and tips for the reader to excel in their career.

Install physical & digital security in a homeowners house (Ex.camera’s and firewall’s on home devices).

Teach network security seminars to corporation’s employees.

Youth online cybersecurity bootcamps suited to be informal and game/activity  implemented as well.

Journal #6

Cyber technology has undoubtedly created a wide opportunity for workplace deviance in my opinion, in many different ways. Property deviance is the first example that comes to my mind when thinking about workplace deviance with cyber technology. An experienced employee that works for a company with access to personal accounts has a huge chance to misuse his or her power. Identity theft is a big problem physically and digitally, someone with multiple identities in their reach can sell the information. Another example of property deviance is verbal abuse, which can be seen all over social media, phone calls and sadly even work emails. With the advancement of technology a lot of people use “ring” cameras, which have been hacked in the past and hackers have harassed people digitally talking to them within their own home! Product deviance can be seen through customer service all across the world. A lot of times corporations will hire employees from foreign countries, who may have trouble understanding the customer. As time goes by the employee and customer usually get frustrated and the employee can easily withhold information or even transfer the call to another coworker to get rid of the customer. Cyber technology has affected workplace deviance in lateness as well. With a lot of jobs being remote or even hybrid, employees may struggle being motivated getting dressed and ready. If the job does not require the worker to join a zoom, they could possibly “show up/start” to work hours late and their boss may not even know. This is along the same lines as logging false hours and going on longer breaks then permitted. I believe it is difficult for the company to know unless they keep track of employees daily/weekly progress. Overall, cyber technology is a vital in today’s society and comes with many positives as it can make life easier but, on the other end it can also be a headache.

Journal #7

 What are the costs and benefits of developing cybersecurity programs in business?

The first of many benefits of developing cybersecurity programs in business is protection! As a CEO of a company I would want to feel secure as my name and reputation is on the line as my business is expected to run like a well oiled machine. Not only would an owner want to feel secure more importantly the customers too! A consumer wants to feel secure and do business with a trustworthy company, as it would make their life much easier. How could and even who would do business with a company that they KNOW is not trustworthy? Having your system down or having internal problems would be bad for business and turn away potential customers. Not only would the company lose out on money but, it would make work much harder for the employees as well. Not having a cybersecurity program apart of the business potentially leaves an opportunity for a hacker to steal information that is expected to be protected. Finding the right fit for the company when it comes to a cybersecurity program is vital, especially considering there are many different price ranges depending on the business’ budget. Depending how profitable to company is will play a huge part when deciding what the business will implement to help protect their brand! “Most corporate leaders believe that a strong cybersecurity program will increase speed and profitability to market. Around 87% of companies in an ISACA survey said that they believed strengthening their cybersecurity program would increase profitability or viability.” (Eisenstein) In my opinion investing in a cybersecurity program for your business is a no brainer and would take the company on another level. Granite, its easy to say I would invest in a cybersecurity program if I had a business but, that is me only speaking hypothetically and I’m currently not actually spending any money. Lastly, I will add it is a dangerous game to play to not be protected digitally in 2022 with personal information connected to the internet.

What Are the Business Benefits of Practicing Strong Cybersecurity?

Journal #8

First thing that came to mind when asking how do you know if your computer is safe Is, your device will show signs. There are many different ways that your computer will/can show you that is in an unsafe state. I will cover multiple different signs your computer or laptop will show in the case of it being vulnerable for an attack. First one that comes to mind is when you are surfing the internet and your device uncontrollably has pop up websites non stop that you are not clicking on. Next if your computer making random sounds it can possibly be warning beeps. The random sounds go hand and hand when an error message pops up, a lot of times, it comes along with a warning message. “Certain pieces of malware stifle that window so you can’t see it. But you might still hear the warning message – a sound in the background that you didn’t initiate.” Lastly, slow operation out of nowhere when it is not usual is another sign that a virus or malware could be on your computer. Installing browser protection software is a step in the right direction to keep your device safe. Also if unwanted programs are already removed then there are less things to worry about. Resetting your browser settings daily as well will allow you to know your computer is safe. Daily anti-virus checks will let you know how your computer is doing and if anything can put your device at risk. CCleaner is a good software to use if you want to make sure there is no malware on your computer and others mentioned here will do a good job of cleaning up your files. Overall, to know if your computer is safe there are signs but, I believe it is just as important to know the signs of when it is not safe too.

Journal #9

The first way computers have made the world safer is better education for the public. Almost any and everything you could think of is on the internet. Computers give us access to the computer to better ourself mentally depending on our intentions. With better education, awareness is promoted and taught online to beware of hackers. Tons of online users would be unconscious to the possibility of them losing valuable information and more without the information accessible online that brings recognition to the situation. Next, is communication through computers makes the world safer in our day to day lives. In 2022, there are many different ways of communication through a desktop or laptop device. Email, Facetime, and Social media are all main methods of conveying online with other users. Emails’ are used in many different ways from business to personal conversations. Facetime (or even Skype), is a great way to visually see a friend or loved one is safe and sound as you can hear see them through your device. Social media is one of the broadest forms of communication displayed in our daily lives. CommunicatingThe first way computers have made the world safer is better education for the public. Almost any and everything you could think of is on the internet. Computers give us access to the computer to better ourself mentally depending on our intentions. With better education, awareness is promoted and taught online to beware of hackers. Tons of online users would be unconscious to the possibility of them losing valuable information and more without the information accessible online that brings recognition to the situation. Next, is communication through computers makes the world safer in our day to day lives. In 2022, there are many different ways of communication through a desktop or laptop device. Email, Facetime, and Social media are all main methods of conveying online with other users. Emails’ are used in many different ways from business to personal conversations. Facetime (or even Skype), is a great way to visually see a friend or loved one is safe and sound as you can hear see them through your device. Social media is one of the broadest forms of communication displayed in our daily lives. Communicating with a loved one or even a stranger no matter the distance has never been easier than now. The downside of the safety when it comes to computers is hackers! Thieves can steal identities, credit card information, valuable files, and sometimes more. Webcams on computers can even be breached and the owner could possibly be watched through the device. I believe in anything in life good comes with the bad and vise versa overall, computers can be dangerous and helpful as well. with a loved one or even a stranger no matter the distance has never been easier than now.

Journal #10

Engineers make cyber networks safer in many different ways which benefits all users involved who expect to have their information protected digitally. From my understanding Engineers are important in the structural portion of keeping the network safe meanwhile, network administrators or even others are behind the scenes overseeing potential threats. Employees involved in safeguarding the network know that there is a never ending cycle of improvement. Information Security Analyst and Engineers are the best of both worlds coming together with one common goal to protect what they work on. Hackers are very advanced in 2022 and continue to become more skilled day by day. With that being said, Engineers continually have to update software responsibilities for multiple different reasons. After a while, intruders can catch on the security system and eventually find a weak spot. One thing guaranteed when it comes to cyber networks that over time eventually, there will be an attack and you can only hope that you and your team is well prepared. No network will ever be perfect but, Engineers work daily towards that to reduce a headache in the future of being breached. Engineers even work in teams which benefits the business that they work for, its possible that a team may not see one slip up but all it takes is ONE employee to see a weak spot and point it out. Once the weak spot is acknowledged the team will work fast and thoroughly to get the problem solved. Engineers are very hands on and even oversee their work as well but, they also have tools that work in their favor to make their jobs easier. Overall, a reliable team is required for Engineers to fully shield the network from unwanted users looking to be a threat. Well trained tech employees matched with hardworking Engineers is a great start for a well-oiled machine.

Journal #11

Cybercrime and criminal justice has many similarities and has one common goal. The common goal that both career paths have alike is to complete the task and are both done majority digitally. With cybercrime, employees and even students in criminal justice can work to prevent crimes from being possibly carried out. Not only can criminal justice put in an effort to stop a crime from happening they solve incidents that have priorly occurred. When a hacker or someone who is illegally doing something online is caught they have to face the consequences through the criminal justice system. The consequences are not always a slap on the wrist, it can be fines, community service, and even jail time! Cybercrime can include many different types of profit-driven criminal activity, including ransomware attacks, email and internet fraud, and identity fraud, as well as attempts to steal financial account, credit card or other payment card information.” Cybercrime is a dangerous path and effects millions of citizens every year globally! Criminal justice provides digital forensics which is vital in their industry to solve crimes and identify criminals. Digital forensics is one overlap related to the other disciplines discussed in this class throughout the year. Cybercrime is when the headache begins for any digital defense team safe guarding information meanwhile, criminal justice is secondary in a sense as they work to prevent and solve online problems. Overall, criminal justice and cyberime are both interesting to me and has me intrigued to read more about their respective lanes. Criminal Justice is not a career path taken lightly as it is highly competitive and a demanding job. What makes the job demanding more than ever is how everything is accessible in 2022 online and vulnerable to be infiltrated. This goes hand and has as well, cybercrime is at an all time high along side an all time high amount of hackers!

Journal #12

How does cyber technology impact interactions between offenders and victims?

A surprising or different way to view the interactions between offenders and victims is how offenders sometimes publicize their crimes for attention or to feel good about themselves for doing a harmful act. Almost in a sense of how offenders will publicly share their wrongdoing with full of pride and a victim can / will share their story to bring awareness to others and receive sympathy. Originally victims would run into issues in person (physically) now, With technology evolving over time citizens are now targeted an victims through online crime. This complete changed how citizens needed to be protected from trouble facing them through their day to day lives. Cyber threats can be or if not more dangerous than in person harm acts committed. There are many different possible illegal acts that can me carried out digitally that would leave a big effect on the victim. Just as big as the crime is the time and consequences may even be bigger. Not only are every day citizens effected by offenders online, corporations are too no matter how well prepared they are for a threat to come. When corporations are breached, money is involved and employees as well. If a hacker gets deep into their system with private files full of information, clients are apart of the companies downfall as well. The dangerous game about digital crime is unless you check daily on your account or it is a well trusted bank corporation you most likely will not be alerted if your information is accessed but an unwanted user. With many forums and discussion groups online there are plenty of information out there to bring awareness to the dangers of the internet. With the interactions between offenders and victims continually changing cybersecurity and hardware equipment is vital to keep important information protected.

Journal #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

I personally believe it is important to study the downfall of other websites or softwares that have been breached to gain understanding to where they went wrong. With having a “short arm” of predictive knowledge you can get an idea on how hackers operate and what they like to attack. If you are a part of a defense team and have a role where you can add investments to the businesses budget, hiring a hacker to see how they think would be a good investment in my opinion. Cyber policies are very important for employees and for the CEO of the company to be at ease knowing his website secured. Cyber policies are needed for employees as well to cross the threshold and commit the wrong acts. As an employee you do no want to make mistakes that could jeopardize clients and the company. The moment that mistake is made then the website or software is vulnerable for an attack and there is no limit to what damage could be done. Updates to the policy have to be made sometimes daily, weekly, and even monthly. It is rare for an infrastructure to be set up and the policies do not change often. Taking the risk of not updating the policy is dangerous as a hacker can catch on to what employees have set in stone. Not only should people take in consideration what did not work in the past but, what did work in the past with other competitors shielding off unwanted users. There are many examples to choose from small and big business are both options to give insight on what works for them. Although, it most likely wouldn’t be detailed the slightest tweak in an infrastructure can be game changing. Overall, if I am a client I expect top notch tools being used to protect my information.