ePortfolio 13: How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

The development of cyber-policy and infrastructure is the rules and guidelines to protect how business is conducted on the internet. The cyber-policy and infrastructure protects but also, needs to be protected in itself.  I say this because when rules are established those rules and guidelines operate seamlessly for a good amount of time.  This is…

ePortfolio 10: How do engineers make cyber networks safe?

Engineers use math and science to assist problem solving and solutions.  Engineers keep cyber networks safe by keeping up with the threats to networks, to install and make software for defending data encryptions.  For example, an engineer will install the new program and teach the users how to operate the program and maintain it.  The…

ePortfolio 1: How does your major relate to cybersecurity technology.

Being that my major is cybersecurity, I will be responsible for the protection of computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.  Some of the basic skills that are required are programming, malware and intruder detection, risk analysis and mitigation, and incident responses. All of these skills will be beneficial as…

ePortfolio #6: How has cyber technology created opportunities in workplace deviance?

Cyber technology has created opportunities in workplace deviance not implanting good practices in training employees, network protections, proper infrastructure, and procedures.  I believe the workplace deviance will affect the cyber technology if the environment of an individual’s work is not structed in a professional manner where all employees can come to work and be happy…

ePortfolio 4: Compare cybersecurity risks in the U.S. and another country.

The first comparison I read form the Kigerl article is that all countries experience spam emails.  This is good information that helps the reader to think about how since the internet can take you all over the world the virtual vulnerabilities are everywhere on the globe.  Spam or what is called botnets causes depletion of…

ePortfolio #8: How can you tell of your computer is safe?

We are all creatures of habit, so we may notice the signs that our computers are not safe and infected with a virus, worms, Trojans, or spyware.  Simple signs that you should be able to notice are your computer slowing down, pop up ads / messages, and your computer crashes often.  There are easy ways…

ePortfolio 11:What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

The overlap between criminal justice and cybercrime is committing the crime on the internet. Rather that just walking outside on the street and committing a crime. This information is clear in the article written by Sinca. (Sinca, 2015). I think cybercriminals are feel secure due to the fact that they are committing their crimes from…