Journal Entry# 13: How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

The Creating of cyber-policy and infrastructure in the face of unknown threats requires a smart approach that understands cyber risks can change fast. While predicting these risks is tough, being proactive helps spot and fix problems early. Working together and sharing information among different groups like governments, companies, schools, federal state and local partners and…

Journal Entry#11 : What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

Cybercrime and Criminal Justice overlap in many ways due to the rise of illegal activities conducted through the digital realm. Law enforcement agencies are tasked with investigating several crimes, which range from hacking to online fraud and embezzlement. This includes gathering digital evidence and tracing online activities to identify the criminals involved in a case….

Journal Entry #10: How do engineers make cyber networks safer?

Engineers have a very important job by not only keeping the world safe, but also, they also work to make cyber networks safer using a range of different methods. One keyway is by using encryption, encryption switches data to make it unreadable to anyone who doesn’t have the proper access or need to know/access. This…

Journal Entry#8 : How can you tell if your computer is safe?

By Ensuring your computer is safe means taking various steps to keep it secure from various online threats. First, one important thing is to have good antivirus and anti-malware software installed and keep it updated. These programs help find and remove harmful software that could mess up your computer. Also, it’s important to regularly update…

Journal #6: How has cyber technology created opportunities for workplace deviance?

Cyber technologies have created many opportunities for workplace deviance such as using company resources for your own use, in authorized access to certain things and cybercrime. In the workplace cybercrime could be huge because the employee could potentially exploit the company, still vital data and expose the vulnerabilities that they might have. Also certain employees…