How should markets, businesses, groups, and individuals be regulated or limited differently in the face of diminishing state power and the increasing intelligence and networking of the material world? They should be regulated in almost the same way. Businesses and markets should have a #1 priority to protect their customer or users credentials and private…
Module 14
How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? A few approaches for the development of cyber policies can be updating software and systems, conduct top to bottom security audits, and maintain industry compliance. Updating software can prevent many security issues that have occurred in the past…
Module 13
How does cyber technology impact interactions between offenders and victims? The internet has been a platform that has created a massive opportunity to create harm to someone in multiple ways. Offenders are able to target people solely through the internet or use the internet to find the personal information of people they may be trying…
Module 12
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? To protect the people from cyber crime laws have been put in place ever since the technology was available to the public and to this day they are still continuing creating new laws…
Module 11 Entry #9
How do engineers make cyber networks safer? Cyber security engineers’ primary mission is to protect the computer systems and networks of an organization from threats and attacks. A security engineer analyzes computer networks, ensures they’re running smoothly and securely and tries to foresee possible security issues that might occur in the future. Security engineering focuses…
Module #7
What are the costs and benefits of developing cybersecurity programs in business? Cyber-attacks and data breaches can cost a business millions of dollars depending on how serious the attack is. Depending on what information was compromised can determine the cost of a breach to business. A business can spend an average of $4 billion due…
Module #6
How has cyber technology created opportunities for workplace deviance? Cyber technology has a big impact on creating new opportunities for workplace deviance. Property deviance can be defined as acts in which employees steal or damage tangible items owned by the organization, such as theft, pilferage, embezzlement, and sabotage. ICT workplace deviance may include sabotaging computer…
Module #5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Create a new software for cyber crimeY Yield information and knowledge that you can teach employersB become a cyber security analystE Eradicate new ways of penetration R Run and install network firewallsS Secure a database for a companyE Erase all…
Module #4
Compare cybersecurity risks in the U.S. and another country. According to government statistics, only 55 percent of Japanese companies conduct cyber security risk assessments, compared to roughly 80 percent in the United States. A study of 60 countries reveals that Japan is in the top five most cyber-secure country. However, increasing mobile and computer ransomware attacks…
Module #3
Describe four ethical issues that arise when storing electronic information about individuals. Privacy, Confidentiality, Security, Integrity are all issues when storing electronic information about individuals online. Privacy is a big issue because of who has availability of the data stored. If the data is public and is visible for everyone to see this is a…
Module #2
Select four other majors offered by ODU and explain how those majors relate to cybersecurity. Majors related to cyber security that is offered by ODU is cyber operations, cyber crime, database administration, and E-Business & E-Commerce (Information Systems & Technology). Cyber operations is the entire scope of cyberspace and related operations that are both technical…
Module #1
How does your major relate to cybersecurity technology? My current major is cyber security which everything to do with cyber security technology. Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. From the course I expect to learn about different infrastructures and systems. Cyber security…