As much as I have spoken on the great innovations and connotations of cyber technology and its development, the world of cyber security is still a growing field and has much to be discovered by cybersecurity experts and analysts alike. A predicament many analysts have had is how we should approach development of cyber policy and infrastructure when we know so little about how the field could develop in the future. Many analysts believe that through the use of predictive knowledge we may have the answer but to others predictive knowledge can only go so far in outlining what we should do. I believe that the development of cyber policy and infrastructure should be moved forward in the following ways; creating more flexible systems that are able to defend against many different threats, collaboration between experts from around the world for better systems, and adopting a new development framework and mindset of balancing security and innovation. Firstly, as a way of circumventing our inability to know what the future of cyber threats might be specifically we should work to create innovations that can work to solve any problems in the future, specifically moving towards creating cyber security systems that can adapt to any threats presented to them which prevents to much development into one field leaving organizations vulnerable in other fields. Secondly, I believe that global cooperation between cyber security experts and engineers when creating systems for protecting organizational data is very important. If engineers were to cooperate in discussing threats and ways to defer them the objective of creating a broad system would be more attainable and if this system was allowed to be spread to organizations around the world more organizations would be safe. Lastly, If we start thinking more about balanced innovation and security we could prevent any wasted efforts in innovation while also preventing possible weaknesses in defending systems.
Author: jmort004
Journal #12: How does cyber technology impact interactions between offenders and victims?
As stated numerous times previously, criminals seem to have taken the internet as a safe place to commit their crimes with a sense of anonymity and more power. With the fact that criminals have more power online it leaves the notion that normal users have become more vulnerable which is important in understanding how criminal offenders and victims interact. The main question asked is how does the improvement of cyber technology coincide with the changing impact on how criminal offenders interact with victims. Firstly, I believe that with the vastness and interconnectedness of the internet, those running criminal enterprises or even small schemes have much more power over normal users. For example, without the internet a criminal may be limited in their ability to scam or exploit when they are locked only to the people around them but with the internet, if done correctly, criminals wishing to gain money through illegal means are able to collect more finances from people all around the world without them even knowing. In terms of criminal enterprises drug racketeering could be seen as a criminal and victim relationship and as such understanding when criminals use the internet to reach a wider group of customers, for example dark web drug markets like the Silk Road site, they may be widening the amount of victims of crime related injury. Criminal offenders committing acts of stalking or harassment may also use the anonymous nature of the internet to stealthily interact with their victims, who themselves have no way of finding out who they are being harassed by and how to confront them about it, and as such it is much harder for law enforcement to track down the original harasser and charge them. In extreme cases cyber bullying and stalking could lead to suicides, which in another way has made murder a seemingly easier affair due to cyber technology.
Journal #11: What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
In our current time period it seems that the overlap between criminal justice and cybercrime has become more apparent as cyber technology and the internet becomes more of a norm in our lives. Criminal activity and organizations have seemingly found the internet a safe haven for their offenses and as such the need for cooperation between cybersecurity experts and law enforcement. Cybercrime is characterized as illegal behavior conducted on cyber technology which can commonly be used as a form of protest or to damage an organization. With the definition in mind it can be understood that those studying criminal justice work hand in hand with those in the cybersecurity field to understand and find ways to prevent cybercrime. Experts in criminal justice often cite the field as a multidisciplinary one and so they work to designate cybercrime experts as a part of their field which has moved slowly in the past few years but is significant to understanding its relation nonetheless. But how does the overlap between cybercrime and criminal justice possibly relate to the other cybersecurity disciplines? It is important to understand that cybersecurity is a developing field and is characterized as a field devoted to prevention of attacks while criminal justice is similarly devoted to the prevention of criminal offenses so as such those following the research and development of those disciplines may use data and techniques refined in cybercrime research to refine their own fields. For example, those in the sociological cybersecurity field may use the conclusions used by cybercrime based criminal justice researchers to better refine their understanding of why crime happens in the first place . It is important to understand that cyber crime, and the understanding of it, has been built into cybercrime and although I mention at the beginning that it is apparent it has also been apparent that the line between cyber and physical crime has definitely thinned.
Journal #10: How do engineers make cyber networks safer?
As the technology and practices of cybersecurity move forward it becomes more and more apparent that the many fields of engineering seem to move forward at an equal rate. Engineers, whether they realize it or not, are supremely important to the improvement of cybersecurity infrastructure and consequently helped to make cyber networks safer, but how do they do so? Cyber network systems do not solely rely on computers to stay safe and continue operation but they also rely on the networks linking them and the physical infrastructure that holds them such as servers, computers, and even the buildings and power wires that connect. As such engineers and their methods of maintaining the infrastructure side of cyber networks help to keep them safe. Firstly, engineers are usually in charge of manufacturing and maintaining the physical computers and servers responsible for hosting the operating systems pivotal to the security of cyber networks and as such engineers have an important job of developing better systems in an effort to prevent any vulnerabilities caused by having a physical problem. Secondly, Engineers have the privilege of being in control of access control systems that grant access to users within a cyber network which is important as engineers may be responsible for the operation of a system that could block a malicious attacker from even getting into a system. Thirdly, Engineers are in charge of running and maintaining “Remote Terminal Units” or RTU’s which are devices with intelligent microprocessors in charge of data logging and potentially sounding alarms in the event of a breach which is important to maintaining communication between engineering infrastructure and cyber systems. Similarly to remote terminal units engineers are in charge of maintaining Programmable Logic controllers which makes controlling processes such as assembly lines or other industrial processes more efficient which can make systems more safer in the event of a breach of industrial facilities.
Journal #9: Describe three ways that computers have made the world safer and less safe.
Computers are undoubtedly one of the most important inventions in human history in that it has revolutionized the way our society develops and runs. Computers in themselves are important in their ability to make computing more efficient and with the addition of the internet in the 1990s revolutionized how work is conducted and how humans communicate with each other. A debate however arises on whether computers have made the world a safer or more dangerous place to live, comparing both the benefits of computers and the potential risks they pose. Although I personally believe that computers help a lot I can also understand where they are a danger. Firstly, I believe that computers have made the world safer in three ways, those being the revolutions in communication, computations of potential data, and investigations. Firstly, computers have changed the ways we communicate more than ever and as such breakthroughs in every field may be spread throughout the globe, for example, with innovations such as the internet, life saving medical procedures become streamline around the world. Secondly, companies in the fields of engineering may use computers to more accurately run safety tests on their products to make a safer environment. Lastly, law enforcement and global courts may use computers to better find and track criminals to arrest them before they commit more crimes. But with all the good things that computers bring there are of course the bad being that over reliance on computers leaves people vulnerable, gives criminals more anonymity, and it is easier than ever for hackers to steal confidential data. Computers have become more relied on in the last 10 years amongst companies so as such hackers may have a better opportunity to break in and halt these companies all together, steal data, and remain anonymous all throughout the cyber crime.
Journal #8 How can you tell if your computer is safe?
Growing up I had always been surrounded by computers and technology and had a lot of fun going to different websites, downloading & playing video games. During this time my parents had also warned me about the dangers of the internet and how to be safe when traversing it due to the many viruses and inappropriate content online. One of the reasons I am so interested in cybersecurity is the fact that I have spent most of my life online and building computers. I knew firsthand how damaging malware could be on my computer and many times I have asked myself, is my computer safe? For me I usually break down the defense of my own computer into three categories to keep track of which are file security through means of antiviruses, a recollection of websites I had visited, and finally manual checks of downloads as an added check. Firstly, to check if my computer is safe I employ the use of antivirus software such as malwarebytes whenever I download new software to ensure that I haven’t downloaded any malware as well as check my files to see if a virus has made its way in and purge them. Although antivirus software may make security more efficient I still find that looking through running processes and files in my system thoroughly and manually to keep extra security. My process for checking manually is to look through task and device manager and look through all processes running and end some that I am not familiar with ever downloading, I also keep my files organized and recorded just in case a certain file containing malware might appear out of nowhere in an attempt to “pass by.” Lastly, I always take note of what sites I have visited and downloaded from in an effort to both prevent untrustworthy websites as well as find the culprit if a virus somehow gets on my computer.
Journal #7: What are the costs and benefits of developing cybersecurity programs in business?
Business is the lifeblood of the American economy and as such could be the target of cyber criminals or foreign powers seeking to gain access and destroy data pivotal to the operation of these businesses. As cybertechnology becomes more and more integral to the way businesses operate it has helped highlight the potential risk posed by not securing this technology as it becomes as easy as ever to gain access and wreak havoc. With this information in mind it can be reasoned that companies must begin considering the implementation and cost of cyber security programs to help better secure their systems. Cost seems to be the reason that most companies are hesitant to fully implement cyber security systems and experts, which is understandable but before speaking on cost itself I believe it is important to understand that even if these programs are expensive at first it is much better to pay the set sum now then pay an insurmountable amount of money in the future when thousands of dollars of data and information are stolen or destroyed in a cyber attack. Cost may differ among different companies as the amount of systems they have may be different as such must use some sort of framework at first to take measure of what they need in terms of security and experts. Many cybersecurity programs may include; insurance, programs, and actual expert training initiatives which usually has a hefty average cost of $57,000 per year but to that I would say to remember the initial cost as compared to the cost of lost data which could be in the millions. The benefits however definitely outweigh the cost as with a proper cybersecurity system businesses may benefit from; higher data security, reduction of financial loss due to stolen data and finally a decrease of workplace deviance.
Journal #6: How has cyber technology created opportunities for workplace deviance?
As said previously, cyber technology has made its way into our society and workplaces more and more which has created much discussion. Much of the discussion is amongst cybersecurity experts about the rising risk of cyber attacks on systems from foreign agents but also from within. Workplace deviance refers to the desire to cause harm to an organization by purposely causing problems in the workplace. With this in mind it can be understood that with the introduction and reliance on computers and cyber technology for the operation of many American workplaces that workplace deviance has a newer way to flourish and can become much more dangerous to organizations. If someone was let go from a company and feels as though they were wronged they might still have lingering verification measures which could allow them to still access systems even after they had been fired. With this access the fired employee, out of spite, could use a virus to infect one system and eventually infect all the systems used by the company, this is possible today due to the accessibility of computer viruses online. This employee might also be enacting their workplace cyber deviance from the safety of their home and as such they would be more likely to be anonymous and not be caught if they were committing the deviance physically within a guarded building. If this person was also to get into the company systems without them knowing, and if the company was to not have cybersecurity experts funded or even present, they may cause much more damage without being caught earlier. While speaking on damages the organization would suffer financially more easily with the data stolen from the disgruntled employee which was stolen much easier due to the fact that they had done it anonymously and with little in terms of being detected.
Journal #5: Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.
This is my take on the journal assignment for this week;
Cryptography usage in decryption and encryption.
Youth programs for cybersecurity occupation information.
Biometric readings software to further authorize identities.
Engineer programs to prevent cyber attacks.
Research frameworks and techniques for better protecting data.
Secure servers housing organizational data.
Execute frameworks to prevent cyber risks.
Create an app that may rank different software in terms of security.
User verification software and algorithms.
Restore lost data from attacks.
Integrate better security techniques in everything you do online.
Take an inventory of computers and data within a system.
Yachters using GPS software that is secure.
Journal #4: Compare cybersecurity risks in the U.S. and another country.
Cyber offenses and crime is a worldwide issue and as such countries around the world are working just as hard as the United States to make strides in the field and protect their industrial and civic systems and data. As an American it is easy to understand the potential risks to American systems but how would other countries fair? It is important to understand that the United States is classified as a first world country which is characterized as being developed with better access to technology and online security. But how do lesser developed countries fare in comparison? I believe a smaller country with smaller funding in terms of cybersecurity would be a country that had one of the biggest cyber attacks occur within it, the Philippines. In the world of cybersecurity the Philippines is well known for the ILOVEYOU virus which had been a computer worm that affected both the United States and Philippines at the same time. The attack had been much more detrimental to the Philippines than the United States as security measures had been much more intensive in American systems then that of the Philippines. Firstly, the funding for cybersecurity engineers in the Philippines would be much lower as compared to the United States, this would obviously be a problem due to the fact that if no one is even present to catch and isolate attacks the damage could be irreversible. Another such problem could be that of computer infrastructure security which could be lacking in the Philippines, whereas the United States may have armed guards and separate buildings to house and protect servers many Filipino servers may be held in house leading to the risk of physical attack from workers. Lastly, the fact that the Philippines has less laws regarding the prosecution of cyber criminals as compared to the United States may allow for more crimes as criminals may be able to pull attacks and not be charged as harshly as the United States.