Journal 13

Society has become so dependent upon technology that it is hard to imagine a world without it. Technology has changed almost every aspect of our lives. People are constantly on their phones, there are computers in almost every device in our homes, and technology is even used at school and work. Technology has grown at…

Journal 12

Although cybercrime offending and victimization have largely been studied separately, there is evidence of shared risk factors, like low self-control and risky online routine activities. This indicates that cybercrime offending, and victimization share similar underlying correlates, and as such should be studied in tandem, as is evident in traditional crimes. For cybercrime, one study to date has specifically explored the possibility of a victim-offender overlap among youth. This study found a considerable crossover in financial cybercrime offending and victimization…

Journal 11

The overlap between criminal justice and cybercrime is that cybercrime is one of the forms of criminal behavior that is studied by the discipline of criminal justice. Many of the concepts and theories that apply to traditional crime also translate into cybercrime and cyber criminals. criminal justice offers a framework for developing, researching, and interpreting…

Journal 10

It’s no surprise that faulty software often leaves networks vulnerable to malware, spyware, adware, phishing and more. Engineers create cyber networks and are constantly looking to improve them. Creating new cyber networks is extremely important because it makes it harder for hackers to gain access into a system if they aren’t familiar with it. A…

Journal 9

It is important to understand that computers have both made the world safer and made it less safe, as it is an amazing tool for regular people as well as those with malicious intent. Arguably, the advent of computers has made the world safer and less with the introduction of online banking. The ability to…

Journal 8

There are many breaches that occur with people’s personal computers especially when there are many scammers that attempt to gain access to a person’s computer and steal money. Generally, ensuring the websites that you are using have the lock near the URL will ensure you are using a secure website and it can be trusted….

Journal 7

Cybersecurity programs in businesses create a net positive effect on the business operations as a whole. Without cybersecurity programs in this age, most businesses would not be able to function properly once someone found out about this. The costs of cyber programs fluctuate with how developed the business wants it to be. In general, a…

Journal 6

Technology creates many opportunities to do good things as well as bad things. It is an incredible tool to use for professional endeavors and it allows a much better workflow and greater efficiency. However, it does create opportunities for workplace deviance. There are many policies in place at most, if not all, companies that handle…

Journal 5

Create a VPN service Yacht gps system for tracking someone’s boat Build websites for people Earn certifications and help people study for them Reach out to a company with information about a security flaw Sell bug fix classes Earn a contract with a defense company Collect and analyze data Use your knowledge to teach companies…

Journal entry 3

Individual privacy is of utmost importance in a digital society. There is effectively a sliding correlation between how much privacy one is willing to give up for convenience. Many websites use cookies to store user information and make it easier to use the website more than once. These cookies are often tracked and used to…