Entry #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? With technology being a rapid and ever evolving piece, it comes with new solutions, new problems, new breakthroughs, and new downfalls. With it, it requires the need for keen governing as well as updated infrastructure to support the…

Entry #12

How does cyber technology impact interactions between offenders and victims? Gone are the days when one is truly alone. Having technology all around everyone, it makes it so that we’re all connected. While that is the purpose of technology, to build bridges, to connect, to be able to share with one another, it has brought…

Entry #11

1. What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? As with many things in today’s society, technology has been intertwined with almost every aspect of our daily lives. Whether that be through day to day activities, communication, transportation, our work, technology…

Entry #10

How do engineers make cyber networks safer? First and foremost, cyber networks and any piece of technology are an ever evolving process, having new things developed, created, and manufactured. With this comes new processes, new technology, as well as new vulnerabilities. With technology being an ever growing thing, so is the process of safety and…

Entry #9

1. Describe three ways that computers have made the world safer and less safe. With the development of computers, there have been a myriad of implications concerning the use of tech, both positive and negative. One big implication is public safety and how computers are used to increase it. While now we have CCTV and…

entry #8

1. How can you tell if your computer is safe? There are multiple ways to keep your computer safe. The best approach is to take it head on and actively find ways to keep your computer safe. One way is to regularly update the operating system. By updating, it implements the most up to date security…

Entry #7

1. What are the costs and benefits of developing cybersecurity programs in business? While pricey, especially on small businesses or for businesses just wanting to be safe, investing in cybersecurity programs for ones business may get expensive. It requires a number of people to keep systems running, implementing software and hardware, training for personnel, time…

Entry #6

How has cyber technology created opportunities for workplace deviance? By having a workplace that is tied with technology and giving or using these systems at work makes the workplace vulnerable. By giving access to information to another person, there is risk of that person breaking that confidentiality. This is ever present in the workplace, and…

Entry #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  Creating a forum for cybersecurity tips Yoyo competition cyber security services to data and information safe Becoming educated in cybersecurity and obtaining a job in cybersecurity Evaluating software like pen-testing Rescuing software and hardware by performing maintenance on it…

Entry #4

 Compare cybersecurity risks in the U.S. and another country. With the US being a leading country in terms of technology use, with it’s citizens, as well as dependency on technology to run governmental systems and infrastructure, it proposes a big risk in terms of cybersecurity. According to the census in 2018, 92% of all households…