Entry 11: What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class

I believe that the overlap between criminal justice and cybercrime will continue to grow as technology develops. However, let us define cybercrime first. Cybercrime legal definition is “cyber-related behavior that is against the law” (1DisciplineCJ). This relates to black-hats and grey hats hackers. They break the law for fun or financial gain. Furthermore, this overlaps with the malware section we discussed because…

Entry 13: How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

We should slowly approach the development of cyber-policy and infrastructure with experts and developers. However, there should be no out-of-date policy, and policies should be transparent to the company and end-users. Now that we have my belief let’s dive deep into the cyber-policy and infrastructure given a short arm and predictive knowledge. First, we need to start with risk management because…

Entry 12: How does cyber technology impact interactions between offenders and victims?

In today’s world, technology is everywhere and is constantly advancing. Furthermore, there is a new dynamic between offenders and their victims. With technology, offenders never need to get near the victim. This significantly increases the difficulty for victims in determining whether an offender has impacted them. With bots and artificial intelligence, it’s very hard for…

Entry 10: How do engineers make cyber networks safer?

First, what do engineers do? They design, analyze, invent, code, build, and create to solve problems (MTU). They are problem-solvers who must understand and tangle with different constraints a device may have or time to design the program. Furthermore, they are professionals who use their knowledge to build the world. They work in various industries,…

Entry 8: How can you tell if your computer is safe?

You can never tell 100% if a computer is safe; however, there are multiple ways to protect a computer. One way is to update your computer. Most companies have what’s called patch Tuesdays. It allows the company to have a constant patch schedule and help keep a computer protected. Another example is having an anti-virus…

Entry 4: Compare cybersecurity risks in the U.S. and another country.

The United States of America has a colossal cybersecurity risk. The U.S.A. is a global power, and its research is valuable to other nations. Those other nations are China, Russia, and Iraq. Why these specific countries? It is because they are at war with the U.S.A. It is not a conventional war but the first…