Timmons Article Review One

Article Review One; An Analysis of Indonesian Cybercrime Cybercrime is devastating, being able to destroy not only individuals and industries but entire societies. Though not a traditional type of assault, cyber-attacks can be just as dangerous as conventional warfare. “Identifying the Prevalence of Cybercrime in Indonesian Corporations: A Corporate Legislation Perspective”, written by Djoni Gojali,…

Journal Post 5 | September 25th

Below I have ranked the motives for cybercrime from the ones that make the most sense to the ones that make the least amount of sense. For clarification, this is my opinion, and I do not condone cybercrime! (Just felt like I should say that, promise I’m not scheming…) 1. For Money/Monetary Gain- The birth…

Journal Post 4# September 20th, 2023

Abraham Maslow’s idea of the ‘hierarchy of needs is applicable not only to the physical world but to the digital world as well. The pyramid goes as follows [from bottom to top]; Physiological needs, Safety needs, Belongingness and love needs, Esteem needs, and finally, self-actualization. This post will break down each segment of the pyramid…

Journal Post 3# September 12th

Prompt: Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal. In cyber space, a data breach can be devastating. The removal of PII, PHI, intellectual property, and banking informational can cause irreparable fiscal or reputational damage. Deterring, mitigating, and preventing…

September 7th Journal Post 2#

Hello World, Whilst starting my trek through the Old Dominion Cyber Security courses, an overarching idea was proposed, that being “cybersecurity is an interdisciplinary field”. The fields that cybersecurity pulls from are numerous and diverse, gathering from specialties like computer science and programming, to seemingly stranger sectors like manufacturing and law. One area in particular…

Journal 1 August 31st 2023

Whilst studying for the CompTIA Security+ exam over the summer, it dawned on me that cybersecurity as a whole is a broad field. The discipline covers a multitude of subjects from law, networking, administration, and ethical hacking. The NICE framework, developed by the National Institute of Standards and Technology, covers a wide variety of cybersecurity…

Entry 13 December 8th

Prompt: How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Approaches to developing cyber policy and infrastructure seem daunting. To boot, predicting the future is impossible. Technological advances are happening at an exponential rate, so predicting every threat that could potentially arise will be like playing a…

November 29th, 2022 Entry 12

Prompt: How does cyber technology impact interactions between offenders and victims? Cyber technology has completely changed how offenders commit crimes and how people get victimized. The dawn of the digital age bred new crimes, but in some cases, certain crimes were merely moved online. For example, ransomware contains all the fundamental aspects of a ransom….

Eportfolio entry 11# November 15th, 2022

Prompt: What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Throughout this course, one overarching point that is continually referenced is how cybersecurity is an interdisciplinary effort. Criminal justice is a major part of cybersecurity and cybercrime, with policies and laws being…