- How do engineers make cyber networks safer?
An engineer’s role in the cybersecurity field is to implement various methods to ensure the security of cyber networks. Each method does a specific task within that network. The first method is Firewalls which can be understood as the controller of both incoming and outgoing traffic in the network. Another method, similar to Firewalls, is Intrusion Detection Systems (IDS) and they look for any type of out of the ordinary activity in network traffic. A third method engineers can implement to make networks safe is encryption. This is when private data is hidden while it is either in the middle of being sent out or just resting, so unauthorized users don’t gain access to that specific information. Multi-Factor Authentication (MFA) is a fourth method of how networks can be made safer by engineers. This authentication method enforces users to give multiple forms of identification prior to them having access to their account within a network. These are just a few of many methods engineers can implement in order to strengthen the security of cyber networks.
- What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
There’s definitely an overlap between criminal justice and cybercrime which can be thought of as a subtopic within a much broader topic. Criminal justice is the broader topic of handling illegal activities of any kind. In contrast to cybercrime which focuses on dealing with illegal activity within the cyber world. An overlap can be seen between the two with investigation techniques. With cybercrime, the investigation process includes seeking after digital evidence from computer systems and networks. Whereas with the broader topic of criminal justice, there are investigation techniques that can be viewed as more traditional like surveillance footage and investigating undercover. Another noticeable overlap between the two is with law enforcement. Whenever an organization is in the event of a cyber-attack, they reach out to law enforcement agencies to assist them in the investigation process. This is in hopes receive the proper justice for the illegal activities that have been brought upon them by cyber criminals.