In regards to the “short arm” viewpoint of knowledge, this is in reference to the fact that we as individuals have a limited plane of view to predict what could happen. So when implementing things like policy and infrastructure for cyber security, we have to put our best foot forward in hopes that the data…
Journal Entry 12
With the development of cyber technology over the years, there are many differences and changes in the ways that offenders and victims interact with one another. Technology has made it easier for individuals to communicate with one another whether that’s through social media, email, phone calls, etc. Anyone whether you know them or not can…
Journal Entry 11
The overlap between cybercrime and criminal justice can be explained in many ways. Cybercrime by definition plays hand in hand with criminal justice as a crime no matter the way it is committed will eventually be processed and dealt with through the criminal justice system. When we look at traditional crime and its characteristics we…
Journal Entry 10
Engineers influence safety measures for cyber networks in several different ways. Engineers can perform assessments of networks to locate weaknesses or just routinely do check-ups and maintenance. A way they might find weaknesses is by doing penetration testing to see how easy it is for them to hack into the network that way it can…
Journal Entry 9
Three ways computers have made the world safe as well as unsafe include improved communication, access to information, and automation. With improved communication, we have multiple methods at our disposal to relay information such as text, phone calls, emails, video chat, social media, etc. This makes the world safer because we can more accurately depict…
Journal Entry 8
In order to figure out if your computer is safe, you need to understand what security risks are possible to originate from your system. This can be easy as looking up what you need to identify these factors or knowing what you have on it and where it is located. Applications can be downloaded to…
Journal Entry 7
Costs and benefits for investing in cybersecurity are important to weigh but in the end, are more beneficial for finances as the potential damages caused by an attack with no protection could be at an astronomical rate in comparison to implementing a cybersecurity plan. Now while taking this into account, it is also important to…
Journal Entry 6
Cyber security allows for many ways that deviancy in the workplace can take place, just as any company has to deal with it no matter their occupation or what services they provide. Cyber security professionals, especially those with top-level security clearance have access to terabytes, even more information pertaining to a company and its assets,…
Journal Entry 5
Create software for a company(s) to combat cyber threats. Youth outreach about interest in cyber through paid camps or school clubs. Beginner tutorials are provided for new learners through a paid program. Engineer apps for companies to utilize VPN services. Reach out to companies to provide information about how your business could secure their information….
Journal Entry 4
In comparison, the United States and the United Kingdom share very similar cyber threats as well as their level of security. This would make sense as they are both allies and a part of the same organizations and partnerships such as NATO, and their main adversaries, Russia and China who are not a part of…