Journal Entry #13 – The Power and Dangers of Computer Technology

The technology/information age has significantly changed and enhanced collaboration by virtually connecting everyone through a digital medium, thereby removing borders and boundaries that disconnect the physical world. It has also placed information, regardless of validity, at the fingertips of every connected user. Finally, according to Moore’s Law, the advancement of computer technology continues to double…

Journal Entry #12 – Cyber Technology’s Amplified Effect on Cybervictimization

Cyber technology has significantly increased the likelihood and impact of interactions between offenders and victims. That interaction may come in several forms, some of which include cyber fraud, cyber bullying, or Internet sex crimes. This is important, because likelihood and impact are generally associated with risk, where greater likelihood and impact increases the opportunity for…

Journal Entry #11 – Criminal Justice and Cybercrime

Criminal justice and cybercrime overlap in many ways; however, they can often be perceived quite differently. Criminal justice was born out of a physical domain, whereas the intangible nature of cyberspace is not always as clear. For example, when someone commits a crime against a person or their possessions, there is a very physical reality…

Journal Entry #10 – Security Engineering – Baking in Security Throughout the System Lifecycle

The information technology age, through increased “mission/business-driven stakeholder needs,” has “increased dependence (on these systems) that results in consequences of major inconveniences to catastrophic loss due to disruptions, hazards, and threats within the global operating environment” (Ross, et al, 2016). Additionally, this information is often available anytime and anywhere; however, access to this information is…

Journal Entry #9 – Do computers make the world more or less safe?

Computers were a significant factor in society’s move to the information age. With computers came incredible power by placing a significant wealth of information at the hands of the user, providing astronomical computing power that could be amplified by pooling processing resources, and providing significant advances in collaboration and information sharing. In addition, Moore’s Law…

Journal Entry #8 – Is your Computer Safe?

Information technology and cybersecurity professionals are tasked with managing the confidentiality, integrity, and availability (CIA) of the data information systems they manage. The average user does not spend a lot of time focusing on the confidentiality (security) aspect; however, when they cannot access information they seek, they perceive this as a critical issue. Although they…

Journal Entry #7 – The Costs & Benefits of Cybersecurity in Business

In 2018, more than 2.5 quintillion bytes of data were created every day, which is 19 digits and looks like this: 2,500,000,000,000,000,000 bytes and…as of July 2020, there were over 4.8 billion Internet users in the world (Vuleta, 2021). With so much data being stored and so many users, it is guaranteed that there are…

Journal Entry # 6 – Cyber Technology, Insider Treats, and Workplace Deviance

The continual evolution of technology in the information age exponentially increases the amount of information that is stored, accessed, utilized, and transmitted daily. This information has varying business and personal value and can be classified in a several ways, some of which includes proprietary, strategic, financial, personal, and health. Even more importantly, at the national…

Journal Entry # 5 – Legal ways to make money in [C-Y-B-E-R-S-E-C-U-R-I-T-Y]

Cyber Analytics SoftwareYARA Malware Identification Rules Development and ImplementationBoundary Protection Tools and Management (Firewalls, IPS/IDS, etc…)Risk Management (Controls)Security Information and Event Management (SIEM)End Point Security Tools and Management(Antivirus, Data Loss Protection, etc…) Configuration ManagementUser Activity Monitoring (UAM)Responding to Cyber IncidentsInternet Protocol Address ManagementTraining and Education (Cybersecurity Awareness)Yearly Asset Lifecycle Financial/Budget Planning

Journal Entry # 4 – Cybersecurity Risk Comparison: U.S. and Developing Nations

As technology and Internet access spread throughout the world, maintaining cybersecurity continues to be just as difficult with rapidly growing costs. As more people gain access to technology, a percentage of those will utilize technology to exploit others for a variety of reasons, also known as cybercrime. Kigerl (2016) was able to find a relationship…