Cybersecurity, Technology, and Society
- Why are you interested in cybersecurity technology?
The U.S loses tens of billions of dollars every year due to cyber-attacks. The attacks were not limited to banks, software companies, show companies or just mom and pop shops. The armed services receive thousands and thousands of cyber-attacks daily, while there have been records of hundreds of thousands of people having their medical record stolen or their banks account and savings taken. The industries that are affected most by cyber-attacks are small businesses, energy companies, government agencies, places of higher education like colleges and health care institutions.
Most of these attacks are caused by viruses and ransomware. The interesting thing about ransomware is that it locks a user out of their device, until they either give the information or money that the hacker is after. Were viruses can cause money loss in a few different interesting ways; such as tricking you into buying and downloading software, or by causing you to watch pop up ads, and what I view as most important which is causing damage to either your software or by damaging and altering the data you are storing.
This field has many outlets that you can take, many realms of defense that you can play a part of. Like being a white hat hacker for a company, which is a hacker that a company hires to find any holes in their network that can be patched before a hacker with malicious intent can find it. A job that I think would be in high demand right now would be data loss prevention. Their job is to work alongside companies to implement and support data loss prevention technology like finding problems and upgrading the software and procedures. The key aspect of their job is to monitor the system and react quickly.
ePortfolio Entry #2
Select four other majors offered by ODU and explain how those majors relate to cybersecurity. Four of the degrees that I have chosen are Computer engineering, Computer science, Criminal Justice, and Information Technology. The major focuses of Computer Engineering are computer hardware and software, while working on solutions for computer problems and testing out different software. Cyber security and Computer engineering both require constant detail and knowledge in networks, technology, software and cloud computing. Computer science is the theories and applications that are used in cyber security to keep data from being hacked into, without the use of cyber security in computer science company or personal data would be stolen much quicker and without much effort. Criminal justice relates to cyber security because much of the worlds crime is now being committed online and because of this there is now a greater focus on national and international cyber laws. Information Technology is the source of keeping hardware and software functional at all times within businesses and homes. IT is responsible for new technology and making sure all updates are produced without flaws, and if they have them then they are able to be fixed efficiently.
ePorftfolio entry #3
Technological advancement is increasing at a pace that has not been seen historically. It has became more of an essential tool, than I think anyone could have expected. Banking, Stock trading, transportation, military power; all of these have been directly impacted by the advancement of technology. All of these categories run off of automated systems, and could be effected directly if countries were to set up cyber attacks, these state sponsored cyber attacks could cripple the country in hours or minutes with out having to land a single soldier within our borders.
At the moment, Russia and China prove to be the greatest threat to the United States of America with State sponsored Cyber attacks. Both of these countries have had success when it comes to cyber warfare against the US. Russia in the recent past has had success with compromising political campaigning and have been though to be responsible of weakening critical infrastructures such as power plants and water facilities. The attacks on power plants and water treatment facilities could cause catastrophic events such as riots and looting if not caught in time. China on the other hand had a cyber attack the leaked the information of federal employees. The increase of these attacks and the efficiency at which they could commit them, could not only threaten the US infrastructure but many other countries and their economies as well.
ePortfolio entry #5
create apps that rates software
yacht GPS software that is secure
business continuity consultancy
e
risk management consultant
security auditing
ethical hacking
create training courses
u
resource monitoring
individual coaching
technologly driven IT solutions
y
ePortfolio entry #6
Cyber technology has created new opportunities because it is much harder to find the person when they are doing the harmful acts behind a computer compared when they are in person and can be caught on a security camera for example. A common example of workplace deviance is when an unhappy employee decides to vent his frustrations on his employer, whether he was fired or believes he earned something he didn’t get, such as a promotion. In the world of cyber technology, for example, if an employee was fired before leaving, he may download important material and sell it to other organizations for profit. He may return to work and continue to hurt the organization if that employee’s authorization wasn’t blocked. This would be considered workplace deviance because you are not following the company’s expectations. Disgruntled employees shutting off their security systems, leaving the organization vulnerable to attack, is another example of cyber technology workplace deviance. As a result, the organization would be vulnerable to hackers infiltrating the system and stealing sensitive data. Because it is far more difficult to locate a person who is committing destructive acts behind a computer than when they are in person and can be recorded on a surveillance camera, cyber technology has provided new options.
ePortfolio entry #7
Cyber attacks have become more prominent and continue to rise, The National Small business Association said that half of small businesses report that they have experienced cyber attack. In 2013 the average cost of a cyber attack would cost a small business around $9,000 on average, where today it could cost a small business on average $120,000 to $1.2 million. Developing a strong cybersecurity program can be a huge financial benefit . It can save these vulnerable companies thousands . Another benefit of developing a cybersecurity program is the protection of sensitive and confidential information . Private and sensitive data can be safeguarded and surveilled with the implementation of a strong cybersecurity program . Customer information , credit card information , and other client ‘s information will no longer be able to be breached , which in turn will cause more trust in using online businesses . Another benefit of developing cybersecurity program in business is reducing phishing and impersonation incidents.
ePortfolio entry #8
You can start doing scheduled testing in setting and configurations. Make sure your browser is always updated. Constantly test your firewalls and make sure its up to date. Permanently delete files that you are not using anymore and are still considered sensitive. install anti-viruses, anti-malware and keep the software up to date. Change your passwords and make sure they are difficult to crack. Do not open any emails or direct messages that have unknown links in it.
ePortfolio entry #9
Computers have had a full effect on the educational system. It has broadened the way users can access knowledge on the Internet. Users can viewbooks, images, audio, and online videos. With the vast amount of data available on the Internet, it enables people to take complete benefit of and consume oneself with knowledge. Computers and technology have influenced the way in which users communicate. The way technology advances have led us to several new forms of electronic communication, social media, voice mail, email, and even video conferences.
Privacy violation has made the world less safe, it implies that someone has access to the data, such as private photos, files, and other people without the authorization. There are a lot of people who used to purchase their photos and videos on their computers. Anyone has access to your private images and posts them openly on social networking sites, it’s going to be bad for the user if this sort of thing happens.
ePortfolio entry #10
The computer network of a company can never be too safe. Security engineer focuses on the design of computer networks that can interact with interruptions such as natural disasters or suspicious cyber attacks. Faulty software will make networks vulnerable to ransomware, spyware, adware, phishing, and more. A technology engineer is someone who evaluates computer networks, guarantees that they operate safely, and attempts to anticipate potential security problems that may occur in the future.
Developing a set of security standards and practices. Installing and using software, like data encryption programs and firewalls. Assistance in the configuration or processing of new safety techniques and practices. Planning to conduct network tests to exploit weaknesses. Tracking systems and networks for violation or intrusion of security. Build software scripts for managing and monitoring incidents.