What is the overlap between criminal justice and cybercrime?

Cybersecurity and cybercrime overlap with many different disciplines including criminal justice. Methods used for criminal justice cases, observation, understanding, and prevention can be used for cyber crimes as well. It is seen that cybersecurity courses are offered in criminal justice programs. And the opposite is true as well, there are sometimes criminal justice courses or influences in cyber security programs. The number of cross studies and programs is low though. Only one fifth of either programs involve studies and courses from the other. This number is growing but a slow pace. Despite the slow growth of involvement from the two disciplines, it is encouraged that professionals from both sides learn and cross study as is it can provide an advantage.  This advantage is necessary as we see more conventional crimes that where once made outside of the digital world begin to occur inside the cyber sphere. These include fraud, embezzlement, and bullying. Criminal Justice professionals can enter cyber careers using skills previously learned in their current profession. They can provide leadership, management, and advocacy. They can also collect counter intelligence as well. Digital forensics is a prime example of these two disciplines intersecting. Forensics was born in criminal justice and digital forensics adopts those tactics used and applies them to a cyber situation.

Both disciplines adopt and cross research with other fields of study as well. Psychology, sociology and philosophy play major rolls in how cases and studies can gain more knowledge and understanding. All five studies combined can create a much fuller picture as to the who, what, when, where, and why cyber crimes are committed. Understanding hackers and their communities’ has to be a fully integrated approach  in order to be efficient and effective in stopping, punishing, predicting and preventing cyber crimes. 

 three ways that computers have made the world safer and less safe

There is no doubt that the impact computers have had on the overall safety of society over the last four decades is undeniable. That impact goes both ways. Computers have both made the world signifyingly safer and less safe.

One way computers have made the world safer is the ease of communication. Computers making communication faster and more accessible has made emergency response more effective and efficient. Faster communication has also improved security on both a national and local scale. National agencies and local security organizations are able to prevent and respond to security events faster. Those agencies can share critical information and coordinate responses. Another way that computers have made a positive impact is through surveillance. The topic of surveillance can be controversial. Some people believe that surveillance has become far too invasive while others believe it is necessary for security. Regardless, surveillance provides a method to monitor public spaces and critical infrastructure.

Computers have also had a negative impacts on the world’s safety. Most relevant to cybersecurity is cybercrime. Hackers have developed the capability to steal or refuse access to banking information, health information, and organizational data. Hackers can use this information to inflict harm on individuals, companies and nations alike.

How can you tell if your computer is safe?

Keeping your computer safe from hacks and viruses is critical in todays day and age. Our computers can contain vital and private information. A personal computer can contain personal information like medical records, banking information, and identifications (social security numbers, etc.). Work computers can hold vital business information that can have varying effects if targeted by hackers or lost completely. There are many ways to notice if your computer is compromised including system crashes, lost files, damaged files, unsolicited pop ups, and more.

Measures can be taken by users to ensure their computers are safe. The first and easiest measures should be using complex passwords as well has dual authentication if possible. This dual authentication can be used with a password and a key, for example a push notification on a phone or a one time use pin sent to your phone. Another measure that should be taken is making sure your computer has antivirus. You want to make sure you are getting a antivirus software straight from the provider and not from a third party as these can be compromised by hackers. Once you have established an antivirus software it is important to ensure it is kept up to date regularly. Users should be aware of the network they are using. A private WiFi network is far more secure than public networks used at places like coffee shops, airports, and large public venues. Verifying your computer is safe from attackers is a constant practice as technology continues to change and evolve.

How to make money with cyber security

Create online cyber security training progams

Youtube channel centered around cyber security

Become a freelance cyber security consultant

Ethical hacking

Rate business’ cyber security policies

Security auditing

Engineering

Commercially used applications

Utilize attack reports to improve security policies

Risk management

Individual coaching

Technology support

Yacht GPS software that is secure

Storing Electronic Information About Individuals

Storing electronic information about individuals can create ethical issues that should be addressed. The first is privacy. Companies in social media, shopping, medical and finances store critical personal information. This can range from banking information, contacts, medical information and behaviors. Some companies may sell this information or some companies may have a network that could be susceptible to attacks. Emphasizing on cyber attacks, another ethical issue, when a company stores information like mentioned before they may or may not be directly responsible for that information. If the organization is attacked, the PII of users is exposed and could be stolen to be used against unsuspecting users. Another ethical issue is how information is transferred. This can include if or not that information being transmitted and received is encrypted. If not it could be stolen. also in instances of power outages or equipment failure, information can be corrupted or lost.

Cyber Security and its relation to other majors

One of the four majors I will compare cyber security is the major I am pursuing, which is computer science. Cyber security is a very specific branch of computer science. Similar to how cyber security is a interdisciplinary effort, computer science is as well with cyber security acting as on of those disciplines. While computer science is more centered around building computers and software systems, cyber security is focuses on safeguarding those systems.

Another major to compare to cyber security would be information technology. IT is another field that encompasses a wide array of topics. CS being one of those. IT has a large need for cyber security which is why it is included in IT programs. Safeguarding information is a key objective in cyber security.

Two more majors I like to compare with CS is both Sociology and Philosophy. These majors both ask the how, why and what. These questions together can be used in cyber security to determine why a cyber attack may occur, how it will occur, and what will the cyber attack be targeting.

Why are you interested in cybersecurity technology?

I must admit that prior to beginning my time at ODU, cybersecurity was not on my RADAR as a possible career option. But entering the Computer Science field as a beginner, any field relating to the subject does start to pique my interest the more I dive in. During my time in the United States Navy Cyber Security was and is a constant responsibility of every service member, DOD contractor and federal government employee. Most of my limited experience with cyber security is centered around being aware of possible ways a foreign advisory can attempt to gain access to information with the intent to harm or exploit the United States national security efforts.

An element of this topic that has become to interest me is the concept of red and blue teams. Creating security measures both physically and digitally. Two teams working opposite each other to accomplish an overall goal of a stronger security system. This is very similar to the training I participated in during my entire Naval career.

I look forward to this Fall semester in this class. I would like to learn more about this specific field and think of it as a possible career option.