Journal #11

What is the overlap between criminal justice and cybercrime? According to Cornell Law School, “Criminal justice is an umbrella term that refers to the laws, procedures, institutions, and policies at play before, during, and after the commission of a crime”. Fundamentally, the difference between cybercrime and criminal justice is the methodology of the crime in question. Cybercrime refers…

Journal #10

How do engineers make networks safer? In the modern world, an enormous amount of critical information is stored in digital form and connected to the internet. This connectivity that affords effortless and instant transfer of data, also leaves that information vulnerable to exploitation. This is true for individuals and institutions alike. Most businesses are completely…

Journal #9

Describe three ways computers have made the world safer and less safe. Safer: Modern medicine has been completely transformed by computer technology. Incredibly in-depth imaging technology allows doctors to see detailed scans of sick patients. The internet has allowed collaborations around the world between experts that improve our understanding of diseases. Data analytics tools help…

Journal #8

How can you tell if your computer is safe? The first thing you can do to tell if your computer is safe is to make sure it’s password protected. This might seem obvious but it’s important. Losing your laptop or having it stolen would give someone access to everything on it if it’s not password…

Journal #7

What are the costs and benefits of developing cybersecurity programs in business? I’ll start with the costs. Cybersecurity isn’t free. A company implementing cybersecurity measures will pay an individual or team of analysts to evaluate their security environment. Following this assessment, the team will setup their security infrastructure. The company will be required to pay…

Journal #6

How has cyber technology created opportunities for workplace deviance? Workplace deviance has many definitions but generally it describes employee behavior that intentionally harms their organization. Cyber technology has opened new avenues for this behavior that present challenges for organizations. As companies increase their use of networking infrastructure for their daily operations, they become increasingly vulnerable…

Journal #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  Create my own cybersecurity companyYahoo.com’s cybersecurity teamBecome a network security engineerEnterprise software securityRansomware analystSystems security engineerEntry level security analystComputer forensics specialistUnix security engineerResponse team memberIT AuditorTrain employees of companies on cybersecurityYamaha security analyst

Journal #4

Compare the cybersecurity risks between the US and another country. The United States is a unique country in many respects. It is large, wealthy, diverse and expansive. These traits present both advantage and challenges in terms of cybersecurity. Relative to other nations, American assets are subject to a high volume of cyber-attacks. This makes sense,…

Journal #3

Four ethical Issues that arise when storing electronic information about individuals. The first ethical issue is ensuring the privacy of the individual. In today’s world, anyone with a bank account has sensitive personal information stored electronically. Anyone who visits a hospital has an electronic health record stored. Privacy means ensuring that only those who need…

Journal #2

Four other majors offered by ODU and how they relate to cybersecurity. Criminology: Criminology is the study of crime. Cybersecurity exists is to protect assets from unauthorized access, theft, compromise, and damage. Those who seek to commit these illegal actions are considered cybercriminals. Just as a police officer or security guard’s job is to fight/prevent…