How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

“Short arm” of predictive knowledge is defined as the ethics of each situation being immediate. Meaning, there is no evaluation of how certain decisions will affect the future. “Short arm” is not beneficial to creating cyber policies and cyber infrastructure. When creating these types of policies it is important identify and analyze possible situations that…

How does cyber technology impact interactions between offenders and victims?

With technology advancing further and further everyday it has created a significant impact on how interactions between offenders and victims occur. Before technology was advanced, crimes were committed face to face and were more hands on. This way, criminal were able to have effect of their victims physically. Now that technology is advanced, more crimes…

How do engineers make cyber networks safer?

There are many types of engineers. Civil engineers, mechanical engineers, cybersecurity engineers and so on. Although there are different engineers for different fields, they all have a sole purpose. An engineer’s purpose is to invent, design, analyze, build and test machines, systems, and structures that will help further advance they field. With the many purposes…

Computers Today: Advantages and Disadvantages

Computers have brought many opportunities and advantages in today’s day and age. Computers have brought us new ways to communicate, develop ideas, improve different fields such as healthcare and the economy.  However, with these positives comes with negatives. Computers has introduced new and safer ways if communicating and social networking. Society can communicate with each…

How can you tell if your computer is safe?

Computers hold most of our important information weather it is for work or personal use. That being said, it is important to check the security and safety of your computer. The first thing u want to look at is your computer settings. With settings you can choose what type of information your computer can receive…

How has cyber technology created opportunities for workplace deviance?

This week, we focused on cybersecurity in the workplace. Cybersecurity in the workplace can be very beneficial. It helps protect the company, the employees, customers, and business partners. With cybersecurity it ensures that important information is protected. With the benefits of cybersecurity also comes with its costs. One of these costs is known as workplace…

list legal ways to make money in cybersecurity.

This week we were asked to use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  C- create training courses Y- YouTube channel to educate people on cybersecurity B- buy stocks E- engage with other cybersecurity hackers to create better ways to combat attacks R- ranging salaries S- sales…

Compare cybersecurity risks in the U.S. and another country.

When looking at cyber security in the United States it is important to analyze cybersecurity in other countries. In doing so, it gives us a better understanding of where we are at in cyber security and how we can improve. This week we were asked to compare cybersecurity risk in the U. S and another…