Journal Entry #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Obviously we can’t predict the future of exact events that will take place, something new happens and develops everyday, regardless of time. With that said, we can always take several precautions and information from past history. Although society…

Journal Entry #12

How does cyber technology impact interactions between offenders and victims? Cyber technology has made some amazing impacts to society and aid in the advancement of civilization. But cyber technology has also contributed to several negative impacts, such as cybercrime/threats. With that said we can see a clear impact in the interactions between offenders and victims.First…

Journal Entry #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Criminal justice and cybercrime tend to overlap each other due to the rise of cyber criminals and crimes being committed. Both disciplines strive to ensure safety for individuals by displaying several factors occurring….

Journal Entry #10

How do engineers make cyber networks safer? Engineers are a key component when wanting networks to be safe. Since many engineers create and manage different softwares and hardwares to protect systems, networks, information and data. Cyber Security engineers are a mutli-disciplinary career involving computer-science, information technology and electrical engineering. It is also a high demand…

Journal Entry #9

Describe three ways that computers have made the world safer and less safe. Computers have impacted the world both positively and negatively. One positive impact of computers is accessibility since, in many circumstances, computers have proven to be very adaptive. For example, online communications. Computers have achieved ways for communication to be available, whenever you’re…

Journal Entry #8

How can you tell if your computer is safe? As we advance in technology and the majority of individuals indulge into their devices, we want to know if it’s safe or not. There are numerous ways to tell if your computer is safe.First is by establishing a strong password. When getting a new computer it’s…

Journal Entry #7

What are the costs and benefits of developing cybersecurity programs in business? In recent times we can observe a growing rate of cybercrime/attacks happening to businesses. Cybersecurity extends over businesses and we can see that both industries have a lot in common, such as companies implementing computers, the creation of cybersecurity businesses, and both want…

Journal Entry #6

How has cyber technology created opportunities for workplace deviance? Cyber crime, threat, or risks are never going away, “The average annualized cost of cybercrime for global companies has increased nearly 62% since 2013, from $7.2 million to $11.7 million. And these are just the average direct costs.” (Blau, 2017).  As cyber technology such as computers,…

Journal Entry #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  C- Creating cybersecurity applications: create certain software or applications to aid in the safety of users. Y- Youtube: becoming a cybersecurity influencer, displaying hacks or teaching cybersecurity. B-Bootcamps: creating boot camps or online courses to teach cyber security E-…

Journal Entry #4

 Compare cybersecurity risks in the U.S. and another country. Cybersecurity risks and attacks are a universal issue and concept that occurs in multiple countries. A lot of different factors and situations come into play when talking about different countries’ cybersecurity. America and China both play a dominant role in our global politics and economics, as…