Modern Technology has been around since after WWII and has steadily evolved from a limited amount of large computers with basic functions to a plethora of very advanced and small computers that can fit in the palm of your hand. Although legislation, policy, and infrastructure have been around longer than technology has, legislation, policy, and…
Author: ashie005
Journal #12 – How does cyber technology impact interactions between offenders and victims?
According to Hazelwood and Koon-Magnin (2013), “Cyber Harassment involves engaging in an act or behavior that torments, annoys, terrorizes, offends, or threatens an individual via email, instant messages, or other means with the intention of harming that person.” (p. 157). Cyberstalking, according to Awati (2021) “is a crime in which someone harasses to stalks a…
Journal #11 – What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
Criminal Justice, according to Legal Information Institute (2020), “is a generic term that refers to the laws, procedures, institutions, and policies at play before, during, and after the commission of a crime.” Legal Information Institute (2020), also states that “as a modern concept, criminal justice expresses two central ideas. The first is that criminals and…
Journal #10 – How do engineers make cyber networks safer?
Engineers are constantly looking for ways to keep and improve the safety and security of cyber networks in a variety of ways that are relevant to their field of expertise. Cyber engineers incorporate computer science and electrical engineering skills to better understand, help secure, and protect cyberspace. These measures are essential in ensuring the stability…
Journal #9 – Describe three ways that computers have made the world safer and less safe.
With computers having an impact on our everyday life from telling the time to controlling the dashboard of our vehicles, computers have made our lives much more convenient than it was 30 years ago. As much as something can make for a safer and easier life, in the wrong hands, those advantages can quickly become…
Journal #8 – How can you tell if your computer is safe?
Being able to tell if your computer is safe is not as easy of an answer as one may think. There are preventative approaches and practices we can utilize to attempt to ensure safety, but unless you are proficient in knowing and having a solution for every vulnerability and also keeping your computer completely disconnected…
Journal #7 – What are the costs and benefits of developing cybersecurity programs in business?
Even though the cost of developing a cybersecurity program for a particular business will vary based on the data it wants to protect and how the business wants to protect the data (ie. with its own respective cybersecurity team or using a cybersecurity firm), the cost of an eventual attack or breach and damages may…
Journal #6 – How has cyber technology created opportunities for workplace deviance?
Workplace deviance has always been a part of the corporate structure. When dealing with human beings that possess different personalities and a hierarchal workplace structure, where someone is telling someone else why, what, where, when, and how to do things to obtain a corporate goal for monetary compensation, a level of deviance can occur over…
Journal #5 – Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.
Cyber Forensics Specialist Yoga business’ customer data information protection Bot detection and mitigation Exploitation Analyst Research and Development Specialist Secure Software Assessor Education as a Cybersecurity Adjunct Professor Cyber Defense Analyst Utilize skills as a freelance consultant to small businesses Report cyberattack vulnerabilities discovered to a company IoT vulnerability tester Threat/Warning Analyst Youtube content creator…
Journal #4 – Compare cybersecurity risks in the U.S. and another country.
According to the International Telecommunication Union (ITU), the Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countries to cybersecurity at a global level. GCI is an initiative of the ITU, along with the UN specialized agency for Information and communication technologies (ICTs), that has been shaped, and improved by the work…