1. How does cyber technology impact interactions between offenders and victims? 2. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Cyber technology has impacted interactions between offenders and victims in my opinion by making it easier for them to communicate with each other. I say that…
Journal Entry 6
1. How do engineers make cyber networks safer? 2. What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Engineers are what I would consider the frontline workers when it comes to cyber networks and their safety. I say that because without them there…
Journal Entry 5
1. How can you tell if your computer is safe? 2. Describe three ways that computers have made the world safer and less safe. The main ways to actually tell if your computer is safe is to delete all unknown information, test your firewall, and install antivirus software as well as VPNs. Firewalls to me are the…
Journal Entry 4
1. What are the costs and benefits of developing cybersecurity programs in business? Small businesses make it very easy to be targeted by hackers and they can’t just jump back to recovery like many other big businesses who may get attacked because they usually don’t have a plan for things like this without someone on their…
Journal Entry 3
How has cyber technology created opportunities for workplace deviance? Cyber technology and technology as a whole have changed how we as humans communicate overall as people. It has changed how we interact with each other overall; it has changed how we feel towards people making us more and more comfortable judging others especially due to…
Journal Entry #2
1. Describe four ethical issues that arise when storing electronic information about individuals. 2. Compare cybersecurity risks in the U.S. and another country. The four main ethical issues that come with storing electronic information are websites that use your Data, Data selling, Data deletion as well as Data breaches. The main website that uses nearly…
Journal Entry 1
Why are you interested in cybersecurity technology? Select four other majors offered by ODU and explain how those majors relate to cybersecurity. Cybersecurity technology has always been something I have been interested in growing up due to my family. My uncle who was more like a father to me is a computer scientist with a…