Journal #13 – How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

Modern Technology has been around since after WWII and has steadily evolved from a limited amount of large computers with basic functions to a plethora of very advanced and small computers that can fit in the palm of your hand. Although legislation, policy, and infrastructure have been around longer than technology has, legislation, policy, and…

Journal #11 – What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

Criminal Justice, according to Legal Information Institute (2020), “is a generic term that refers to the laws, procedures, institutions, and policies at play before, during, and after the commission of a crime.” Legal Information Institute (2020), also states that “as a modern concept, criminal justice expresses two central ideas. The first is that criminals and…

Journal #10 – How do engineers make cyber networks safer?

Engineers are constantly looking for ways to keep and improve the safety and security of cyber networks in a variety of ways that are relevant to their field of expertise. Cyber engineers incorporate computer science and electrical engineering skills to better understand, help secure, and protect cyberspace. These measures are essential in ensuring the stability…

Journal #8 – How can you tell if your computer is safe?

Being able to tell if your computer is safe is not as easy of an answer as one may think. There are preventative approaches and practices we can utilize to attempt to ensure safety, but unless you are proficient in knowing and having a solution for every vulnerability and also keeping your computer completely disconnected…

Journal #5 – Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.

Cyber Forensics Specialist Yoga business’ customer data information protection Bot detection and mitigation Exploitation Analyst Research and Development Specialist Secure Software Assessor Education as a Cybersecurity Adjunct Professor Cyber Defense Analyst Utilize skills as a freelance consultant to small businesses Report cyberattack vulnerabilities discovered to a company IoT vulnerability tester Threat/Warning Analyst Youtube content creator…

Journal #4 – Compare cybersecurity risks in the U.S. and another country.

According to the International Telecommunication Union (ITU), the Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countries to cybersecurity at a global level. GCI is an initiative of the ITU, along with the UN specialized agency for Information and communication technologies (ICTs), that has been shaped, and improved by the work…