Cyber technology has impacted interactions between offenders and victims significantly. There are new avenues for crime and it has altered the dynamics of traditional criminal behavior. Online platforms offer a sense of anonymity and there is a large pool of potential victims to choose from. This makes it easier for offenders to find and target…
Prompt 6: How do engineers make cyber networks safer? What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in cybersecurity?
Engineers have a vital role in defending networks. Among the strategies used you can see segmentation which is when they divide networks into smaller isolated segments which limits the spread of attacks and minimizes damage. Creating multiple layers of security controls to include firewalls, intrusion detection systems, and data encryption. Implementing a zero trust network…
Prompt 5: How can you tell if your computer is safe? Describe three ways that computers have made the world safer and less safe.
When owning a computer, it’s important to know whether it is safe and if anything has compromised the system. One thing to look out for is signs of malware. This can be evident if there are performance issues such as noticeable slowdowns, unusual program behavior, or unexpected shutdowns. If you sense suspicious activity such as…
Prompt 4: What are the costs and benefits of developing cybersecurity programs in business?
When developing cybersecurity programs in business you can expect to have costs, however paying for these provisions will benefit business owners in the long run. Costs can be associated with technology when acquiring and maintaining security software, hardware, and network infrastructure. You’ll need to hire personnel that specifically deal with cyber security who have training…
Prompt 3: How has cyber technology created opportunities for workplace deviance?
As technology has been advancing, it has become easier for employees to engage in workplace deviance. This causes a severe risk to organizations. Employees now have the opportunity to do things anonymously which removes the fear of consequences. This can be in reference to online harassment, cyberbullying, stealing confidential information, or a new term, cyberloafing…
Prompt 2: Describe four ethical issues that arise when storing electronic information about individuals. Compare cybersecurity risks in the U.S. and another country.
When it comes to storing electronic information, four ethical issues come to mind. Those issues would be privacy, security, accuracy/control, and access/control. When discussing privacy, everyone has the fundamental right to control their personal information. The large amount of data collected electronically proves to be a significant risk of invasion of this right. We see…
Prompt 1: Why are you interested in cybersecurity technology? Select four other majors offered by ODU and explain how those majors relate to cybersecurity.
I am interested in cybersecurity technology because I was a cryptologist in the Navy and figured it would be best to broaden my knowledge and obtain a degree in the field I already had experience in. While in the Navy I also acted as a security officer. Doing that made me realize the importance of…