What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Criminal justice and cybercrime often overlap with each other due to how most crimes today have some sort of technology implemented within their acts of crime. The modern world is technology-driven, and criminal…
Journal Entry #10
How do engineers make cyber networks safer? Engineers make cyber networks safer by staying up to date with cyber networking to keep it secure and adapting to the ever-changing and constantly evolving world of technology. Every day, there are new ways of hacking and performing security breaches being developed, and someone has to counter these…
Journal Entry #9
Computers have been evolving and advancing at a rapid pace over the years. It’s done a lot to help the world be safer over time, but at the same time, it has also been used in ways that make things less safe. Just like there’s a way to use computers to your benefit, there will…
Journal Entry #8
How can you tell if your computer is safe? The best way to tell if your computer is safe is to keep a consistent schedule in running diagnostics on its maintenance or virus scans. It is highly recommended to run these types of tests daily, especially if the computer is in a work environment or…
Journal Entry #7
What are the costs and benefits of developing cybersecurity programs in business? The costs and benefits of developing a cybersecurity program within your business can vary with how seriously you take the precautions of a cyber attack. The Cybersecurity aspect within a business is important, so companies that have the money to spare often put…
Journal Entry #6
How has cyber technology created opportunities for workplace deviance? Workplace deviance is the act of a person intentionally disrupting or interfering with a business/company to negatively impact its operations. There have always been cases of various businesses having employees who take advantage of the status or responsibilities that their position holds, and that is where…
Journal Entry #5
Create an application that monitors your Youtube channel teaching Cyber Security Become a Cyber Security Analyst Earn job opportunities by applying or Cyber Security internships Reach out to business for opportunities Security Auditing Ethical hacking for organizations or people Cyber Security consulting services to businesses Upload security advice to advertise on platforms Risk assessment management…
Journal Entry #4
Compare cybersecurity risks in the U.S. and another country. The U.S. shares a greater risk with cybersecurity in comparison to other countries, like China, due to its availability and unrestricted access for citizens. Any person or organization could use unethical practices or even fall victim to them. Of course, hacking/unethical technology use occurs in every…
Journal Entry #3
Describe four ethical issues that arise when storing electronic information about individuals
Journal entry #2
Select four other majors offered by ODU and explain how those majors relate to cybersecurity. 2. Cybercrime 3. Data Science & Analytics 4. Cyber Operations