Journal Entry 13

When developing cyber-policy and infrastructure in the face of predictive uncertainty, in this regard, this may require an overall dynamic, and adaptive approach. Given the “short arm” of predictive knowledge, where the rapidly evolving nature of technology, often outpaces our ability to foresee specific threats, several key strategies can be employed, and perhaps implemented in…

Journal Entry 12

With Cyber technology, as the impact it has had, has seen it profoundly influence the dynamics, and interactions between offenders and victims, it has also in the process, reshaped these dynamics, overall. Firstly, as the anonymity and accessibility provided by the internet has enabled offenders to exploit, harass, and victimize individuals in ways that were…

Journal Entry 11

With Criminal Justice and cybercrime, there is an overlap, given the many commonalities that are found, and apparent within both. With this, as cybercrime refers to illegal activities carried out through the use of digital technology and or too, the internet, with some notable examples including: hacking, phishing, identify theft, and fraud; a correlation can…

Journal Entry 10

In order to make cyber networks safer, and enhance their overall security, engineers may implement and employ a comprehensive array of both strategies, as well as tools. With this, as encryption, intrusion detection, access control, and vulnerability management all may be present, in this way the safeguarding of these interconnected devices, can be had. With…

Journal Entry 9

Three ways that in which computers have made the world safer, can be seen within that of the security, accessibility, and communication, that has been provided as a result of computers. With this, from a security standpoint, as computers have played a crucial role in the development, and implementation of cybersecurity measures, to protect individuals…

Journal Entry 8

As the multifaceted approach to ensure the safety of a computer, can encompass the implementation of proactive measures, and practices alike, such as that of secure passwords, firewall protection, anti-virus as well as security software, data backups, and regular updates and assessments, to name a few, in this regard, safety and security can be made….

Journal Entry 7

When developing cybersecurity programs in business, as this can entail both costs and benefits, in this way, there can be lots to examine. For starters, from a cost perspective, as initial costs from the onset, may include an investment in hardware, software, and personnel, this may call for the purchasing of firewalls, Intrusion Detection and…

Journal Entry 6

Within the workplace, in a modern day sense, as the advent of cyber technology has offered unprecedented opportunities for enhanced efficiency, security, and connectivity; in addition to these beneficial aspects provided, opportunities for workplace deviance, have also too, been created. With this, as deviance refers to, and is defined as, behaviors or actions that violate…

Journal Entry 5

Some legal ways in which to make money in Cybersecurity, may include: Coding – Coders can use programming languages, to detect and respond to cyberthreats Yielding and producing cloud storage services for businesses – By providing cloud storage, the data of a business can be stored, in the cloud. Bug bounty program usage – This…

Journal Entry 4

As the current landscape of Cybersecurity today, is characterized by both advancements, as well as too challenges seen in a technological sense, something that has also had lots of prominence in this regard, is that of cyber risks. With this, as advances in technology have caused cyber risks to ultimately rise, this has become a…