Journal #13

The “short arm” of predictive knowledge refers to the perspective and moral behavior of each situation being current, and since it is impossible to know what consequences comes with a decision, it is impossible to assess its deficiencies. This lack of knowledge must be considered as we address the creation of cyber infrastructure and legislation. The goal…

Journal #12

The factors that contribute to the connection between criminals and their victims may widely range. Because interactions between the two could never occur without the cybercrime perpetrator and their awareness, cyber technology has an influence on how offenders and victims interact. If the cybercriminal is caught, they will either get away with it or later…

Journal #11

            A significant portion of crime is related to technology. Cybercrime, computer crime, Internet crime, and cybersecurity are now all included in the field of criminology. Efforts to promote safer computing in all its forms will be strengthened by a better understanding of the links between criminal justice and cybersecurity. The growing threat posed by…

Journal #10

Cybersecurity networks should constantly be enhanced to provide the user with the highest level of protection. In order to make upgrades and reduce system vulnerability to cyber assaults, cyber networks frequently communicate with other users to learn how they were attacked. Cyber networks are built by engineers, who are also continually working to make them…

Journal #9

In today’s society, computers play a major role in almost every aspect of our daily lives. Overall, I think computers have improved the safety and comfort of our society. Computers have numerous benefits, and they have helped us improve the world in various ways. However, not everything about computers is positive; there are a lot…

Journal #8

The Information Systems Audit and Control Association (ISACA) identifies the following types of malicious cyber-related activities: Hacking, Malicious code, Loss of intellectual property, Phishing, Denial of service, and Insider damage. However, the two I’ve chose to discuss are Phishing and Hacking. Both phishing and hacking are cybercrimes used to target people/organizations to access and retrieve…

Journal #7

Setting up a cyber security system is crucial for businesses, no matter the size. They can safeguard business data from unauthorized access and human mistake. However, establishing cyber security procedures can be expensive. Initial setup costs include: hiring a cyber security provider to install their system on your systems. In order to effectively protect its…

Journal #6

            Workplace deviation refers to “behavior that violates organizational norms”. Within a workplace, on a generalized scale, there are: customers, workers, and leaders. In cyber technology, workplace misconduct is more likely to happen since it may take place online rather than in person, giving it an ‘anonymous’ factor and making it more difficult to catch. A…

Journal #5

Consultant (Independent) Yacht GPS software that is secure Buy cybersecurity stocks Experience in the field Rent out a space to a cyber security company Security Auditing Eventually create your own cyber security company Certifications relating to IT/Cybersecurity Unite multiple companies to report hacks in order to improve security for them all Reversing of malware Investing Teach…

Journal #4

The US, China, Brazil, Germany, and India make up the top five countries according to the Symantec ranking. The negative effects of several cybercrimes are highly publicized in numerous papers. Spam emails are a frequent attack method for several kinds of cybercrime. 72% of all emails sent globally now are spam. Spam makes up much…