Prompt 7: How does cyber technology impact interactions between offenders and victims? How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

Cyber technology has impacted interactions between offenders and victims significantly. There are new avenues for crime and it has altered the dynamics of traditional criminal behavior. Online platforms offer a sense of anonymity and there is a large pool of potential victims to choose from. This makes it easier for offenders to find and target…

Prompt 6: How do engineers make cyber networks safer? What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in cybersecurity?

Engineers have a vital role in defending networks. Among the strategies used you can see segmentation which is when they divide networks into smaller isolated segments which limits the spread of attacks and minimizes damage. Creating multiple layers of security controls to include firewalls, intrusion detection systems, and data encryption. Implementing a zero trust network…

Prompt 3: How has cyber technology created opportunities for workplace deviance?

As technology has been advancing, it has become easier for employees to engage in workplace deviance. This causes a severe risk to organizations. Employees now have the opportunity to do things anonymously which removes the fear of consequences. This can be in reference to online harassment, cyberbullying, stealing confidential information, or a new term, cyberloafing…

Prompt 2: Describe four ethical issues that arise when storing electronic information about individuals. Compare cybersecurity risks in the U.S. and another country.

When it comes to storing electronic information, four ethical issues come to mind. Those issues would be privacy, security, accuracy/control, and access/control. When discussing privacy, everyone has the fundamental right to control their personal information. The large amount of data collected electronically proves to be a significant risk of invasion of this right. We see…