CYSE200T ePortfolio entry #2

Select four other majors offered by ODU and explain how those majors relate to cybersecurity. Four of the degrees that I have chosen are Computer engineering, Computer science, Criminal Justice, and Information Technology. The major focuses of Computer Engineering are computer hardware and software, while working on solutions for computer problems and testing out different software. Cyber security and Computer engineering both require constant detail and knowledge in networks, technology, software and cloud computing. Computer science is the theories and applications that are used in cyber security to keep data from being hacked into, without the use of cyber security in computer science company or personal data would be stolen much quicker and without much effort. Criminal justice relates to cyber security because much of the worlds crime is now being committed online and because of this there is now a greater focus on national and international cyber laws. Information Technology is the source of keeping hardware and software functional at all times within businesses and homes. IT is responsible for new technology and making sure all updates are produced without flaws, and if they have them then they are able to be fixed efficiently.

Article 2 Review

                                    Career Professional paper: Digital Forensics

Their role is to collect and analyze any type of digital evidence from erased or damaged hard drives, document the retrieval of data and maintain the chain of custody, assist law enforcement, and sometimes give expert testimony in court. Also commonly using social media to extract evidence, with social media being a hotbed for crime since so much personal information is available at any given time.

            In today’s world, most of the opinions and attitude on any given topic is heavily swayed by social media or other internet applications. There are roughly 3 billion active users across all social media platforms, that spend on average 2 hours every day. There are several types of crime that can be committed through social media: Online threats or cyberbullying, hacking and fraud, buying illegal products, posting videos of criminal activity, and vacation robberies.

            Cyber bullying is one of the most reported crimes on social media, and most of the time it isn’t taken seriously, or the act goes unpunished because victims don’t know what to do or if they can call the police. If a threat is made online, A digital forensic analyst can extract conversation logs that include sender and receiver information, dates, and times of message even if they have been deleted by the perpetrator of the assault.

            Hacking and Fraud can be a light joke between friends, such as just posting a silly status update while logged into a friends account. But creating a fake account in order to trick people can be punished as fraud depending on the actions the count holder takes. Some social media frauds can be “clickbait” scams, impersonation scams and online dating and romance scams.

Clickbait scams can be such that you will see a post saying “check out these photos taken after the football game last night” you might click the link and be asked to click two more links after that. But thanks to having antivirus programs downloaded, you get an alert that your computer has just blocked an attempt to install a virus. An Impersonation scam is when you might receive a message from a friend saying, “hey I have lost my ticket for my flight, and I need 400 dollars to buy a new ticket to get home”, but you know that your friend’s home because you saw them at school that day. Scam artists will hack into peoples’ profiles and send fake messages to the victims’ friends in hopes of receiving money from them. Online dating scams are when fake accounts will reach out to single victims in hopes of building an online relationship, once they feel that the victim is comfortable enough with them, they ask for money and disappear once they receive it.

Peer networking on social media plays a big role in the profession of digital forensics. Research shows that those with friends that commit cybercrimes, tend to commit cybercrime as well. The types of crime that are usually perpetrated via peer to peer are plagiarism, the sharing of illicit images of children or revenge porn, fraud, hacking or the sharing of viruses and malware. 10% of ex partners have threaten to expose naked photos of their exs, and over half of those have actually exposed them. In the U.K. it was reported that over 1,000 incidents of revenge porn happened in the span of a year, with victims as young as 11 years old, with over half of the reported incidents having no consequences for the perpetrator.

The reason I chose digital forensics is because it is a critical piece in criminal cases, civil fraud cases, internal investigations and other situations that require analysis to understand who, when, and how technology was used. With the rise in technological advancements of computers, cellphones and GPS devices it; it is paramount to have those who can claw through the array of digital evidence that could be key to investigations and prosecution of criminals.

Citation

Carley, K. M. (2020, November 16). Social Cybersecurity: An emerging science – computational and mathematical organization theory. SpringerLink. Retrieved November 27, 2022, from https://link.springer.com/article/10.1007/s10588-020-09322-9

“Social Media Scams.” Social Media Scams | The Office of Attorney General Keith Ellison, www.ag.state.mn.us/consumer/Publications/SocialMediaScams.asp.

George Khoury, Esq. “5 Common Types of Social Media Crime.” FindLaw, 31 May 2019, www.findlaw.com/legalblogs/criminal-defense/5-common-types-of-social-media-crime/#:~:text=Online%20Threats%2C%20Stalking%2C%20Cyberbullying&text=While%20much%20of%20this%20type,they%20can%20call%20the%20police.

Leave a Reply

Your email address will not be published. Required fields are marked *