Module 1- Threat analyses and Targets are the two specialties that I find most appealing, and Exploitation analyst is the specialty that I find the least appealing. I like Threat analyses because it involves a lot of collaboration with other analysts in your organization and outside of it, to constantly approve. Targets is an interesting specialty because it has to do with recognizing areas in your own analyses that could lead to weaknesses while needing to uses multiple different sources for intelligence gathering. Exploitation seems to be the least interesting to my because it seems to be mostly about conveying information in a digestible form.
Module 2- Science creates and improves products, scientific knowledge can improve products that already exist and can lead to further product innovation and efficiency. The drive behind science is information and curiosity, which is very important for information security and is shown by the increased value placed on data and cybersecurity. In cyber security, science will help improve process that will move us away from hand me down knowledge; and will streamline all cyber knowledge.
Module 3- The site is very helpful when it comes to seeing the different ways that data breaches can occur. In 2022 Eighty-Eight percent of company Executives said that cyber breaches to be a direct threat, not just a Technical IT issue. In 2020 Forty-Five percent of companies suffered data breaches, but this number could be higher due to breaches that have gone undetected. The state with the highest amount of data breaches has been California with New York being a second, and we could only assume because of their population density and both being centers for technology and business.
module 4- Self actualization can be expressed by a creative side which and be done technologically like creating art like videos or posting literature or pictures online. Esteem needs can be met through validation through social media, by people agreeing with your views and opinions or by having a knowledge of technology that can be valued by a business as an employee. Belonginess and love needs can be met by social media and online forums that build communities of people that share hobbies and experiences. Safety needs can be expressed through developing knowledge and skills about online safety, that can keep your privacy and data intact. Physiological needs cannot be met through technology.
Article 1 Review
International Journal of Cyber Security: View of Cyber Laws Related to Prevention of Theft of Information Related to Acquisition of Land and Infrastructure Resources in Indonesia
This article is about property fraud or acquisitions of land and property through theft of information, and the laws that control and prevent the cybercrimes attached to them. Article 263 of the criminal code, says that who ever creates a forged document or falsifies a document and tries to use it as if it were legitimate, can be imprisoned for a maximum of 6 years. The two agencies that are responsible for the protection of data and implement cyber security laws are the Ministry of Electronic Information law and the Ministry of Communication and Informatics. They’ve established punishments for cybercrimes such as 600 million rupiah fine or four to eight years in prison for unlawful access to data without permission by hacking.
Fraudsters methods of stealing information are hacking, trespassing cyberspace, computer vandalism, and getting unauthorized access to digital information. Fraudsters use various types of malwares to steal records from the land registration offices to create fake documents. Fake driver licenses and passports are created to create a bank account as the “owner” of the property.
Before the move to electronic transactions and data records, these frauds were executed through force, bribery, or blackmail. Now they are being done through creating a passport with the legitimate owner’s name and superseding the fraudsters face onto it, creating a bank account in the legitimate owner’s name, selling the property, and sending the money from account to account making it difficult to follow the trail.
The National Land Agency (BPN) keeps all records of property ownership in Indonesia. There are two types of electronic land documents; the first type of document issued needs to be validated by an electronic signature while documents transferred from other media need to be validated by authorized officials and given a digital stamp through the electronic system. The Law on land Acquisition that replaced the previous Agrarian law made it easier to acquire land and protected landowners against “Land Mafia”.
Cyber criminals have robbed many people in Indonesia of their land rights, costing hundreds of billions of rupiahs (which translates to about 3 million US dollars). Hackers and phishing agents have aided in the stealing of land and access into landowners’ data. Hacking, Malicious emails, Phishing, and Falsification of land documents have been countered by human factors such as the creation of a cybercrime unit in the police force.
Citation
Suhend, D. (n.d.). View of Cyber laws Related to Prevention of Theft of Information Related toAcquisition of Land and Infrastructure Resources in Indonesia. Retrieved October 2, 2022, from https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/35/12
Module 5
The First motive that I would suggest would be For Money, Billions of dollars worth of damages are done every year or stolen from people due to their financial information being stolen. Id put revenge as The Second motive because of disgruntled employees who might have felt looked over or have gotten fired in a way they deemed unfair. Third I would say Political, there have been many cyber attacks done on campaigns and have thought to have been used during elections for office. Fourth I would put recognition, only because now a days so much value has been put on being in the spotlight or becoming famous anyway you can. Fifth I would put Multiple reasons, because people are so multifaceted that there are usually a conglomerate of feelings and emotions working together at all times. Sixth and Seventh I would put Boredom and Entertainment in no specific order, because I don’t think their are many people who would commit crimes just to commit crimes; but there are those select few who like to push the boundaries and see what they are capable of doing.
Module 6- It is possible to create three real websites and three fake websites, and tell the difference between them. Fake websites are created to trick people into sharing information, download malware, or to buy products that do not exist. There are things you can do to check to see if a website is fake or not. You can check the domain name and domain age. Scammers will try and make the domain name look as legitimate as possible, but cannot make it the exact same as the real domain that they are trying to copy; and because of this the age of the domain will be new than the original company. You can also look for spelling errors, design issues and other red flags like coloring and product offers.
Module 8- I think there is a mix of information that media gives about cybersecurity. I think that They make it try to look as critical and deep your knowledge or understanding has to be to be prolific in cybersecurity. Obviously there are some very critical cyber security jobs that take high levels of expertise that only geniuses can perform, but most I would say the average person could achieve with a few years of learning. Coding and hacking are by far the most conveyed actions in any Hollywood movie, so most people believe that those are the only cybers security jobs out there.
Module 9- I scored very low on the disorder scale, if scoring on it at all. I think the items on the scale are very extreme, but disorders are very extreme. I believe that different patterns are found across the world, because there are different living experiences around the world. In the western world, life is centered around technological advancement and is necessary for daily life. In other parts of the world, community and religion are more important then technology which would show why some countries have low levels of social media use.
Module 10- The article speaks on how the global economy is easily impacted by state sponsored agents and non state sponsored agents, completely changing the land scape of the battlefield from sending bullets to sending malware. That cyber attacks have now changed from trying to cause physical and economic damage, now they are sending political attacks, theories, science and more.
Module 11- The article begins with saying how most ethical hackers were afraid of reporting bugs or issues, because they are afraid of companies taking legal action back in the early 2000s. But that changed drastically in 2020, where there the market for ethical hackers had pulled in 100 million dollars in bug bounties. The net positives of bug bounties is that they help companies that have bugs in their codes, and that small companies can fix their problems and pay freelance hackers while not having the capital to have full time cyber experts.
Module 12- I think collecting information about children is the most serious offense online. Faking your identity is something that can cause people to lose money on top of private data. Bullying and trolling are things that cause real life damage, such as isolation and can lead to suicide which mostly effects younger adults and children. using unofficial streaming service causes companies to lose money, but can also effect those who do this by possibly downloading malware that can cause you to lose information.
Article 2 Review
Career Professional paper: Digital Forensics
Their role is to collect and analyze any type of digital evidence from erased or damaged hard drives, document the retrieval of data and maintain the chain of custody, assist law enforcement, and sometimes give expert testimony in court. Also commonly using social media to extract evidence, with social media being a hotbed for crime since so much personal information is available at any given time.
In today’s world, most of the opinions and attitude on any given topic is heavily swayed by social media or other internet applications. There are roughly 3 billion active users across all social media platforms, that spend on average 2 hours every day. There are several types of crime that can be committed through social media: Online threats or cyberbullying, hacking and fraud, buying illegal products, posting videos of criminal activity, and vacation robberies.
Cyber bullying is one of the most reported crimes on social media, and most of the time it isn’t taken seriously, or the act goes unpunished because victims don’t know what to do or if they can call the police. If a threat is made online, A digital forensic analyst can extract conversation logs that include sender and receiver information, dates, and times of message even if they have been deleted by the perpetrator of the assault.
Hacking and Fraud can be a light joke between friends, such as just posting a silly status update while logged into a friends account. But creating a fake account in order to trick people can be punished as fraud depending on the actions the count holder takes. Some social media frauds can be “clickbait” scams, impersonation scams and online dating and romance scams.
Clickbait scams can be such that you will see a post saying “check out these photos taken after the football game last night” you might click the link and be asked to click two more links after that. But thanks to having antivirus programs downloaded, you get an alert that your computer has just blocked an attempt to install a virus. An Impersonation scam is when you might receive a message from a friend saying, “hey I have lost my ticket for my flight, and I need 400 dollars to buy a new ticket to get home”, but you know that your friend’s home because you saw them at school that day. Scam artists will hack into peoples’ profiles and send fake messages to the victims’ friends in hopes of receiving money from them. Online dating scams are when fake accounts will reach out to single victims in hopes of building an online relationship, once they feel that the victim is comfortable enough with them, they ask for money and disappear once they receive it.
Peer networking on social media plays a big role in the profession of digital forensics. Research shows that those with friends that commit cybercrimes, tend to commit cybercrime as well. The types of crime that are usually perpetrated via peer to peer are plagiarism, the sharing of illicit images of children or revenge porn, fraud, hacking or the sharing of viruses and malware. 10% of ex partners have threaten to expose naked photos of their exs, and over half of those have actually exposed them. In the U.K. it was reported that over 1,000 incidents of revenge porn happened in the span of a year, with victims as young as 11 years old, with over half of the reported incidents having no consequences for the perpetrator.
The reason I chose digital forensics is because it is a critical piece in criminal cases, civil fraud cases, internal investigations and other situations that require analysis to understand who, when, and how technology was used. With the rise in technological advancements of computers, cellphones and GPS devices it; it is paramount to have those who can claw through the array of digital evidence that could be key to investigations and prosecution of criminals.
Citation
Carley, K. M. (2020, November 16). Social Cybersecurity: An emerging science – computational and mathematical organization theory. SpringerLink. Retrieved November 27, 2022, from https://link.springer.com/article/10.1007/s10588-020-09322-9
“Social Media Scams.” Social Media Scams | The Office of Attorney General Keith Ellison, www.ag.state.mn.us/consumer/Publications/SocialMediaScams.asp.
George Khoury, Esq. “5 Common Types of Social Media Crime.” FindLaw, 31 May 2019, www.findlaw.com/legalblogs/criminal-defense/5-common-types-of-social-media-crime/#:~:text=Online%20Threats%2C%20Stalking%2C%20Cyberbullying&text=While%20much%20of%20this%20type,they%20can%20call%20the%20police.