Journal Post #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Society has very dependent upon technology. So much so that it is hard to imagine a world without it. Technology has changed almost every aspect of our daily lives. People are constantly looking at their phones, there are…

Journal Post #12

How does cyber technology impact interactions between offenders and victims? In my opinion, I definitely believe that the advancement of technology has impact the number of way we can fall victim to cyber crime. The interactions between offenders and victims are usually limited as a person can fall victim to cyber crime and not even…

Journal Post #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Cybercrime can be described as a type of crime carried out by using a computer and usually targets networked devices. This form of malicious cyber activity is harmful to public safety and our…

Journal Post #10

How do engineers make cyber networks safer? Engineers play a key role in making cyber networks safer as they are the backbone of cyber security. These engineers are responsible for protecting the networks and information of an organization against potential harmful threats. These engineers also use their computer science skills to better understand cyber threats…

Journal Post #9

 Describe three ways that computers have made the world safer and less safe. As nowadays almost everyone’s daily lives are affected in someway by technology, we are going to look at how it’s become safer and also less safe. Majority of the world believes that computers have made the world easier. Computers have significantly impacted…

Journal Post #8

How can you tell if your computer is safe? Computer safety has become increasing important as many individuals find it hard to detach from social connections. From online banking and social media to working from home, it is hard to find an individual whose daily life doesn’t include computer or internet use. When working from…

Journal Post #7

What are the costs and benefits of developing cybersecurity programs in business? Cyber Security is very essential to businesses. For the most part cyber security is beneficial to businesses in the sense that organizations should want to protect their businesses and assets. Cyber Security programs are the best way to protect businesses as cyber security…

Journal Post #6

How has cyber technology created opportunities for workplace deviance? Workplace deviance is an extremely important topic as the misuse can lead to multiple negative outcome for the individual and organization. Due to the evolution of Cyber Technology there has been a significant misuse in information and communication in technology among the workplace. Workplace deviance can…

Journal Post #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  Create an app providing independent cybersecurity consulting. YouTube channels can be used as an educational tool to provide tutorials to people. Become a Book writer to tell people about unique experiences. Event Training courses on cybersecurity. Regenerating software programs…

Journal Post #4

Compare cybersecurity risks in the U.S. and another country. With much of our personal data being shared and stored online, the need for different countries to address cybersecurity risks is of the utmost importance. Many elements go into making sure a country is secure as we need to protect the infrastructure. In the U.S., phishing,…