entry #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? The “short arm” in reference to predictive knowledge refers to the ethics and the viewpoint of each individual situation as being immediate because there is no way to know or to predict the future consequences or repercussions of…

entry #12

How does cyber technology impact interactions between offenders and victims? The interactions between offenders and victims and their impacts have changed and advanced highly due to advancements in cybercrime. In the past, most crimes were committed face to face, but nowadays a lot of crimes are committed online or through technology. Examples of this include…

entry #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? There are many ways that criminal justice and cybertechnology and security overlap each other. I see this overlap a lot considering I am a criminal justice major. Technology has a lot of connections…

Entry #10

How do engineers make cyber networks safer? Cybersecurity networks are always being updated and improved in order to keep them and make them even safer. Engineers play a very important part in keeping and making cybernetworks safe. creating new cyber networks and keeping them up to date is extremally important because it makes it more…

Eportfolio entry #9

 Describe three ways that computers have made the world safer and less safe. The world today revolves around computers, Technology effects everything we do and is in every aspect of life in the 21st century today. Computers today are linked to transportation, socialization, productivity, education, etc. There are many advantages to computers and they have…

Eportfolio entry #8

How can you tell if your computer is safe? There are many ways to make sure your computer is safe, and also many ways too ensure you keep it safe. The first thing to can do to ensure your computers safety from viruses, hackers, etc. is to make sure you have a firewall enabled. The…

Eportfolio #7

What are the costs and benefits of developing cybersecurity programs in business? First and foremost having a cybersecurity setup is extremally important for businesses. Having cybersecurity allows you to prevent hackers and cyber attacks as well as having information stolen. One of the downsides of cybersecurity is that it can be expensive. Having cybersecurity requires…

Eportfolio #6

Workplace deviance is described as when someone , usually an employee, purposely tries to destroy or sabotage the workplace or its systems and information. There are two types of workplace deviance those being organizational deviance and interpersonal deviance. Organizational deviance are behaviors that have deviated from the standards and organizations expectations. Interpersonal deviance is described…

Eportfolio Entry #5

Create training courses Youtube security Build an application Ecommerce Researching data for companies Security auditing Educating others on cybersecurity Cybersecurity stocks Uniting multiple companies to make one company Renewing companies cybersecurity networks and databases Industrial cybersecurity Training others in cybersecuirty Your own company/ building a company

EPortfolio Entry #4

How do cybersecurity risks in the U.S. compare to those in other countries? I want to specifically focus on how they compare to cybersecurity risks in China. While the U.S is above average when it comes to cybersecurity and technology we are not the best nation. We rank fifth among 60 nations when comparing cybersecurity…

Eportfolio Entry #3

This weeks discussion topic is to discuss and describe four ethical issues that arise when storing electronic information about individuals. These four major issues are privacy and confidentiality, security breaches, system implementation, and data inaccuracies. Privacy and confidentiality are used by places such healthcare and insurance companies and the key to providing people privacy and…

Entry #2

The four other majors at ODU that I think relate to cybersecurity are Cybercrime, Cyber Operations, Database Administration, and Web Programming. I think the biggest one relating to cybertechnology would be cybercrime, I also find this major to be the most interesting as I am making it my minor. There are many reasons why I…

Journal #1

I am interested in cybersecurity for many reasons. The first and main reason is because of my career path. For the past 6 ears I have wanted to become an FBI agent eventually working my way up to be a Profiler for the BAU. I think that taking cybersecurity courses throughout college would look very…