The Creating of cyber-policy and infrastructure in the face of unknown threats requires a smart approach that understands cyber risks can change fast. While predicting these risks is tough, being proactive helps spot and fix problems early. Working together and sharing information among different groups like governments, companies, schools, federal state and local partners and…
Author: agord017
Journal entry# 12: How does cyber technology impact interactions between offenders and victims?
Cyber technology has a big impact on how offenders and victims interact. It makes it easier for offenders to find and target victims because they can reach people from anywhere in the world using the internet. Offenders can hide their identities online, making it harder for victims to know who is harassing them. They can…
Journal Entry#11 : What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
Cybercrime and Criminal Justice overlap in many ways due to the rise of illegal activities conducted through the digital realm. Law enforcement agencies are tasked with investigating several crimes, which range from hacking to online fraud and embezzlement. This includes gathering digital evidence and tracing online activities to identify the criminals involved in a case….
Journal Entry #10: How do engineers make cyber networks safer?
Engineers have a very important job by not only keeping the world safe, but also, they also work to make cyber networks safer using a range of different methods. One keyway is by using encryption, encryption switches data to make it unreadable to anyone who doesn’t have the proper access or need to know/access. This…
Journal Entry#9: Describe three ways that computers have made the world safer and less safe.
Computer have made the world safer in numerous ways, one way in my opinion computers have made us all aware of things happening in the world. For example, has made major improvements to the medical field such as MRI, CT scans and x-ray machines. Computers have also made it easier to accurately diagnose patients to…
Journal Entry#8 : How can you tell if your computer is safe?
By Ensuring your computer is safe means taking various steps to keep it secure from various online threats. First, one important thing is to have good antivirus and anti-malware software installed and keep it updated. These programs help find and remove harmful software that could mess up your computer. Also, it’s important to regularly update…
Journal Entry #7: What are the costs and benefits of developing cybersecurity programs in business?
There are many pros and cons to having cyber security programs in your business. Some benefits could be keeping the integrity of your systems safe and stopping the hackers from stealing important information. Another benefit could be saving money, having good cyber security practices in place could help from cyber attackers and hackers because after…
Journal #6: How has cyber technology created opportunities for workplace deviance?
Cyber technologies have created many opportunities for workplace deviance such as using company resources for your own use, in authorized access to certain things and cybercrime. In the workplace cybercrime could be huge because the employee could potentially exploit the company, still vital data and expose the vulnerabilities that they might have. Also certain employees…
Journal #5: Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.
C- Create apps that rate software Y- Yacht GPS software that is secure B- Beauty software that scans your face for hyperpigmentation E- Encryption software for various forms of payments R- Re-Routing computers in a computer lab S- Security Auditor for a small business E- Ethical Hacking for a large organization C- Cybersecurity Specialists U-…
Journal #4: Compare cybersecurity risks in the U.S. and another country.
With cyber-attacks in the United States being increasingly frequent, it’s a must that we must know what types of attacks we will be facing. The world with emphasis on the United States being tech driven it is becoming easier to gain unauthorized access to many things. Much of our jobs are ditching paper and are…