Compare cybersecurity risks in the U.S. and another country. Symantec has created an index of cybercrime activity. The top five nations on the Symantec index are the United States, China, Brazil, Germany, and India. Spam emails are a very common source of cybercrime. Spams happen in all countries but the top countries that suffer from…
Journal 12
How does cyber technology impact interactions between offenders and victims? Cyber technology is a new way of communication. Someone can be across the country and still talk to a person. With this being said it is also a lot easier to cyber harass or cyberstalk. It is a lot easier for an offender to harass…
Journal 7
What are the costs and benefits of developing cybersecurity programs in business? The cost of developing cybersecurity programs in business can be very expensive but it is not more expensive than the amount of damage that a business can be hit with if they were to get cyber attacked. In the past six years, 112…
Journal 11
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? There is a big overlap and relationship between criminal justice and cybercrime. Criminal justice is the delivery of justice to those who have committed crimes. Criminal Justice is supposed to protect citizens from…
Journal 10
1. How do engineers make cyber networks safer? Engineers are always looking for ways to improve the cyber network to be safer. They are constantly developing new ideas and applying them. They will reach out to other co-workers or other people in their field and they will bounce ideas off of each other. They also learn…
Journal 9
Describe three ways that computers have made the world safer and less safe. The advancement of technology today is amazing. It helps us so much in ways we overlook everyday. At this point technology and cumputers are just a natural way of life. It is crazy to think they were not always around. But even…
Journal 8
1. How can you tell if your computer is safe? There are a couple of different ways a person can use to tell if their computer is safe. The first way would be to run anti-virus software. There is plenty of anti-virus software that ranges from free to pretty expensive. Another way to notice if something…
Journal 6
How has cyber technology created opportunities for workplace deviance? The definition of deviance is the “fact or state of departing from usual or accepted standards, especially in social or sexual behavior.” The advanced cyber technology today has created many more opportunities for workplace deviance. The one major issue about cyber technology today is that some…
Journal 5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. For example: Create an app that rates software.Yacht GPS software that is secureBuild a firewallEarn more certificates Rate a security softwareSystem auditingEngineer for computers Create a penetration test Unite multiple companies to be more aware of cybercrimesRent out space for cybersecurity companyImplement improved…
Journal 3
1. Describe four ethical issues that arise when storing electronic information about individuals. There can be many ethical issues when it comes to storing electronic information about other individuals. Especially with the advancement of technology today. There are more and more people using advanced technology as well. The more that technology is used for storing personal…