Journal Entry 14 CYSESS

The speaker had a fascinating journey into the field. The speaker actually started as an accountant. His story is a great example of how careers can take unexpected turns and how different fields can intersect in surprising ways. He began working in a small accounting firm, where he also handled some IT tasks. This blend of accounting and IT experience eventually led him to a big accounting firm that was starting a digital forensics team. Even though he didn’t know much about digital forensics at the time, he jumped at the chance because it sounded cool. This decision changed the course of his career. What struck me most was how his work is connected to understanding human behavior. Digital forensics isn’t just about sifting through data; it’s about piecing together stories and motivations behind digital actions. This is where the social sciences come in. Fields like psychology and sociology help forensic investigators understand why people commit crimes and how they interact in digital spaces. This knowledge is crucial when tracking down cybercriminals or figuring out the intent behind digital evidence. His job also involves a lot of covert operations, like collecting data without people knowing. This part of his work requires a strong grasp of legal and ethical issues, which are rooted in social science principles. It’s not just about the tech; it’s about understanding the broader implications of their findings on people’s lives and society. The speaker’s career path shows that having diverse skills and being open to new opportunities can lead to exciting and fulfilling careers. It also highlights the importance of a multidisciplinary approach. In digital forensics, you need technical skills to handle the data and social science knowledge to understand the context and impact of that data. Listening to his story made me realize how interconnected our world is becoming and how valuable it is to have a broad skill set.

Journal Entry 12 CYSESS

Navigating the online world can be tricky, especially when it comes to distinguishing between legal and illegal activities. I’ve found myself using unofficial streaming sites to watch sports events and movies for free, appreciating the convenience but now realizing the significant legal issues involved. These platforms distribute content without proper licensing, making it a clear violation of copyright laws. This could lead to potential lawsuits and exposes my personal data to security risks. Similarly, I’ve been benefiting from a friend’s Spotify family plan without contributing, which, although seemingly harmless, is technically illegal. This practice involves using a service without paying for it, essentially amounting to theft. The author’s insights have highlighted the legal and ethical implications of such actions, underscoring the importance of adhering to legitimate streaming services and paying for what I use. By doing so, I not only avoid legal repercussions but also support the content creators and service providers. This reflection has made me more aware of the need to be responsible and respectful in my online activities, aligning with both legal standards and ethical principles. Moving forward, I am committed to using legitimate services and ensuring that my online behavior is both lawful and ethical, avoiding the pitfalls of convenience-driven, yet illegal, actions.

Journal Entry 11b CYSESS

The article explores the effectiveness of bug bounty policies, which pay ethical hackers to identify vulnerabilities in a company’s cyber infrastructure. It highlights how these programs have become a crucial part of cybersecurity strategies, allowing companies to leverage external expertise. The literature review discusses various studies showing that bug bounties can be cost-effective compared to traditional security measures, as they provide a broad pool of talent and diverse perspectives on potential security issues. The findings indicate that bug bounty programs significantly enhance a company’s security posture. Companies that implement these policies tend to discover and fix vulnerabilities more quickly, reducing the risk of breaches. However, the effectiveness of these programs depends on clear guidelines, adequate rewards, and proper management of submissions. The article emphasizes that while bug bounties are economically beneficial, they must complement, not replace, other security measures.

Journal Entry 11a CYSESS

Rational Choice Theory: This theory says people make decisions to maximize their benefit. After the breach, Glasswasherparts.com had to decide if the cost of beefing up security was worth it compared to the potential loss from future breaches. Clearly, they chose to invest in better security to avoid bigger losses down the line (Module 11 Notes, p. 13). Cost-Benefit Analysis (CBA): This involves comparing the costs of actions to their benefits. The company hired a cybersecurity firm and cooperated with law enforcement, which isn’t cheap. But the benefits, like preventing more breaches and maintaining customer trust, outweigh these costs (Module 11 Notes, p. 11).  Behavioral Economics: This theory looks at how psychological factors affect economic decisions. Customers might hesitate to shop with Glasswasherparts.com again after the breach. By being transparent and taking strong action, the company aims to rebuild trust and reassure customers (Module 11 Notes, p. 11). Social Contract Theory: This theory is about the unwritten agreement between people and authorities. Customers trust companies to protect their data. When Glasswasherparts.com failed, they had to act quickly to restore this trust by communicating openly and fixing the issues (Module 11 Notes, p. 13).

Journal Entry 9 CYSESS

The Social Media Disorder Scale is pretty spot-on in covering different ways social media can mess with our lives, from being obsessed with checking it all the time to how it impacts our relationships and daily activities. It’s relatable because we all know the feeling of needing to check our feeds or feeling left out when we can’t. Different patterns around the world come down to cultural and societal differences. In some places, social media is the main way to stay connected, while in others, there’s a huge pressure to show off a perfect life online. Economic factors also matter; in countries with less tech access, social media use and its issues look different. Generational differences play a role too, with younger people often more hooked. Overall, the scale highlights how deeply social media is embedded in our lives and how its impact varies based on our environment and personal circumstances.

Entry 6 CYSETS

Engineers enhance the safety of cyber networks through a combination of advanced techniques and regular maintenance practices. They implement encryption protocols to protect data during transmission and storage, ensuring that sensitive information remains confidential and secure from unauthorized access. Firewalls and intrusion detection systems are deployed to monitor and filter network traffic, preventing malicious activities and attacks from penetrating the network. Regular security audits and vulnerability assessments are essential, as they help identify and address potential weaknesses in the system before they can be exploited. Engineers also design and enforce strict access control policies, ensuring that only authorized personnel can access critical resources, which reduces the risk of insider threats.The overlap between criminal justice and cybercrime is significant, as both fields are involved in the prevention, investigation, and prosecution of illegal activities conducted through digital means. Law enforcement agencies often collaborate with cybersecurity experts to track and apprehend cybercriminals, utilizing forensic tools to gather and analyze digital evidence. This relationship underscores the multidisciplinary nature of cybersecurity, intersecting with disciplines such as law, ethics, and information technology. Understanding these overlaps is crucial for students studying cybersecurity, as it broadens their perspective on how different fields contribute to combating cyber threats and ensuring justice. For instance, digital forensics plays a vital role in both cybersecurity and criminal justice. It involves the collection, preservation, and analysis of electronic data to support legal investigations. By understanding the legal implications and ethical considerations of their work, cybersecurity professionals can better assist law enforcement in prosecuting cybercrimes. Additionally, knowledge of criminal justice procedures helps engineers design more effective security measures that comply with legal standards and protect users’ rights. This comprehensive approach is essential for developing robust cybersecurity strategies that not only safeguard networks but also support the broader goal of maintaining law and order in the digital realm

Journal Entry 6 CYSESS

Initially, I thought cybersecurity was only about technology and complex code. But as I learned more, I realized how critical human factors are. For example, social engineering exploits human psychology rather than technical flaws. So, cybersecurity isn’t just about firewalls and antivirus software. It is also about training people to recognize phishing scams and other tactics that hackers use to trick them. Another misconception I had was thinking that cybersecurity was mainly about protecting against external threats. I discovered that insider threats are just as significant. Employees, whether intentionally or accidentally, can pose huge risks to an organization’s security. This highlighted the importance of a comprehensive security strategy that includes monitoring internal activities and fostering a culture of security awareness. Overall, my studies have shown me that cybersecurity is a much broader and more nuanced field than I initially thought. It’s not just about stopping bad hackers with cool tech; it’s about understanding human behavior, implementing strong policies, and continuously adapting to new threats. My initial misconceptions have been proven wrong.

Entry 5 CYSETS

  1. How can you tell if your computer is safe?

To determine if your computer is safe, there are several indicators you can check. Firstly, ensure that your operating system and software are up-to-date, as updates often include security patches that protect against new threats. Additionally, having a reputable antivirus program installed and running regular scans can help identify and remove malicious software. Monitoring network activity can also reveal unusual patterns that might indicate a breach. For instance, if you notice unexpected spikes in data usage or unknown devices connected to your network, it could be a sign of an intrusion. Another important step is to use strong, unique passwords for different accounts and enable multi-factor authentication where possible. Lastly, regularly back up your data to an external drive or a secure cloud service to prevent loss in case of a ransomware attack or other data breach .

  1. Describe three ways that computers have made the world safer and less safe.

Computers have significantly impacted global safety in various ways. On the positive side, they enhance safety through improved data security. Advanced encryption methods protect sensitive information from unauthorized access, ensuring privacy and data integrity. Additionally, computers facilitate sophisticated surveillance systems that help law enforcement monitor and prevent criminal activities, enhancing public safety. For example, real-time data analysis can predict and mitigate potential threats before they materialize. Another benefit is in healthcare, where computers enable precise diagnostics and treatment planning, improving patient outcomes and reducing medical errors.

However, computers also introduce new vulnerabilities that make the world less safe. Cybercrime is a major concern, with hackers exploiting weaknesses in software to steal data, commit fraud, and disrupt services. The rise of ransomware attacks, where malicious software locks users out of their systems until a ransom is paid, exemplifies this threat. Another downside is the potential for widespread misinformation. The internet, powered by computers, allows for the rapid dissemination of false information, which can lead to public panic, influence elections, or incite violence. Lastly, the dependency on computers for critical infrastructure, such as power grids and transportation systems, creates targets for cyberterrorism. An attack on these systems can have catastrophic consequences, disrupting essential services and endangering lives.

Journal Entry 5 CYSESS

Ranking of Motives for Cyber Offending: 

  1. For Money 
  1. Recognition 
  1. Entertainment 
  1. Political 
  1. Revenge 
  1. Boredom 
  1. Multiple Reasons 

Explanation: 

For Money: It’s no surprise that cash is king in the cybercrime world. Cybercriminals can rake in serious dough, and they often spend it on everything from basic needs to luxurious splurges. Dr. Mike McGuire’s research shows that these criminals can earn a ton and use their earnings to buy fancy stuff, invest, or fund more crimes. The financial lure is a huge driver because who wouldn’t want to make a quick buck? 

Recognition: Many hackers are in it for the clout. Just look at Bradley Niblock, who DDoS’d a Labour candidate’s website to gain followers on Twitter. For these cybercriminals, earning respect and fame within their circles can be as thrilling as the crime itself. It’s about standing out and proving their skills to peers. 

Entertainment: Some cybercriminals are just in it for the kicks. Remember the LinkedIn scraping incident? The guy behind it did it “for fun” and then turned around and sold the data. It’s all about the thrill and the challenge, which can be pretty compelling motivations for some people. 

Political: Hacktivism is making a comeback, with hackers using their skills to make political statements. From exposing surveillance programs to meddling in elections, politically motivated cybercrimes can have massive impacts. It’s a way for hackers to push their agenda and create change. 

Revenge: Sometimes, cybercrime is personal. Revenge porn is a brutal example, where offenders post intimate photos to humiliate and hurt their victims. This motive is all about causing pain and getting back at someone, making it a dark but real driver of cybercrime. 

Boredom: When people are bored, they can get into all sorts of trouble online. The pandemic lockdowns saw a rise in cyberbullying and online grooming as kids turned to the internet for entertainment. Boredom can push people to explore illegal activities just to pass the time. 

Multiple Reasons: Often, it’s not just one thing driving someone to cybercrime. Wendy Zamora’s research highlights how complex these motivations can be, mixing money, power, and personal issues. Some hackers might feel marginalized and see cybercrime as a way to assert themselves and gain some control. 

Sources 

Entertainment 

Political   https://economictimes.indiatimes.com/magazines/panache/new-generation-of-angry-youthful-hackers-join-the-hacktivism-wave-adding-to-cyber-security-woes/articleshow/81707844.cms  

Revenge  https://newsfromwales.co.uk/news/revenge-porn-victims-in-wales-often-feel-let-down-by-the-law-as-cybercrime-slips-through-the-net/  

Boredom  https://www.heraldlive.co.za/news/2021-05-31-cyberbullying-and-online-sexual-grooming-of-children-on-the-increase/  

Recognition  https://www.theregister.com/2021/06/30/bradley_niblock_election_ddos/  

For money   https://threatresearch.ext.hp.com/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-their-money-infographic/  

Multiple reasons   https://www.infosecurity-magazine.com/news/what-drives-hackers-to-a-life-of/?__cf_chl_jschl_tk__=pmd_c1d89a4695edbd23f2bceb54d70f35ce5e536e86-1626721164-0-gqNtZGzNAfijcnBszQi6  

Entry 4 CYSETS

Developing cybersecurity programs in business comes with both costs and benefits, and it’s essential for modern companies to weigh these carefully. Costs include financial investments in technology, personnel, and ongoing maintenance. Companies need to buy and update software and hardware and secure their infrastructure. Hiring cybersecurity experts and training staff is also pricey. Plus, creating and enforcing security policies, doing regular security checks, and meeting legal standards add to the expense. On the financial side, these costs can be substantial, but they are necessary to protect the company’s assets. However, the benefits are significant. Protecting sensitive data and intellectual property is a big win, preventing data breaches and cyber-attacks. This builds customer trust, which is crucial since breaches can lead to massive financial losses, legal troubles, and reputational damage. According to the Ponemon Institute, the average loss due to cyber-attacks is $7.7 million a year, with higher costs in sectors like finance. Cybersecurity also ensures business continuity by preventing disruptions from attacks like ransomware. It gives businesses a competitive edge because customers prefer companies that protect their data. Additionally, businesses that invest in cybersecurity are better positioned to comply with legal standards and avoid hefty fines. This compliance not only helps in avoiding legal penalties but also promotes ethical practices within the organization. While it’s a significant investment, the protection, trust, and competitive advantage make cybersecurity programs vital for any business. In essence, the upfront costs of developing robust cybersecurity programs are justified by the long-term benefits of protecting the company’s assets, maintaining customer trust, and ensuring business continuity. Investing in cybersecurity is not just a technical necessity but a strategic business decision that supports sustainable growth and resilience in an increasingly digital world.