Career paper

The field of cybersecurity offers many different career paths to explore. From web security to risk mitigation and beyond, the options are expansive. Personally, I am interested in cybersecurity management and running a business. In this paper, I delve into various roles within the field, including those on both the red and blue teams. As…

Entry 11: What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class

I believe that the overlap between criminal justice and cybercrime will continue to grow as technology develops. However, let us define cybercrime first. Cybercrime legal definition is “cyber-related behavior that is against the law” (1DisciplineCJ). This relates to black-hats and grey hats hackers. They break the law for fun or financial gain. Furthermore, this overlaps with the malware section we discussed because…

Entry 13: How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

We should slowly approach the development of cyber-policy and infrastructure with experts and developers. However, there should be no out-of-date policy, and policies should be transparent to the company and end-users. Now that we have my belief let’s dive deep into the cyber-policy and infrastructure given a short arm and predictive knowledge. First, we need to start with risk management because…

Article Two Review

Do people have to worry about privacy threats in an intimate relationship? Today, we will explore privacy threats in intimate relationships by Karen Levy and Bruce Schneier. With more people on the Internet and computers getting smaller and smaller, people run the risk of privacy threats in their relationships from abusers. This paper will explore…

Entry 12: How does cyber technology impact interactions between offenders and victims?

In today’s world, technology is everywhere and is constantly advancing. Furthermore, there is a new dynamic between offenders and their victims. With technology, offenders never need to get near the victim. This significantly increases the difficulty for victims in determining whether an offender has impacted them. With bots and artificial intelligence, it’s very hard for…

Entry 10: How do engineers make cyber networks safer?

First, what do engineers do? They design, analyze, invent, code, build, and create to solve problems (MTU). They are problem-solvers who must understand and tangle with different constraints a device may have or time to design the program. Furthermore, they are professionals who use their knowledge to build the world. They work in various industries,…

Entry 8: How can you tell if your computer is safe?

You can never tell 100% if a computer is safe; however, there are multiple ways to protect a computer. One way is to update your computer. Most companies have what’s called patch Tuesdays. It allows the company to have a constant patch schedule and help keep a computer protected. Another example is having an anti-virus…

Entry 6: How has cyber technology created opportunities for workplace deviance?

Technology has undeniably revolutionized the modern workplace, offering more convenient and connective ways than ever before. However, it has created opportunities for workplace deviance by making it easier to get distracted at work. First, what is deviance? It is “a difference from what most people consider normal or acceptable” (Deviance Noun, 2023). Now, how does…