Journal Entry #7

This meme relates to Human Systems Integration because as mentioned in the module PowerPoint, most human-enabled errors are costly and mostly avoidable. If the dog can “learn” how to be secure on his Ipad, then there’s no excuses for humans to not learn and practice proper security hygiene in the workplace!

e-Portfolio Entry #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Cybersecurity and National Critical Infrastructure are both extremely important for national security, as well as the well being for all members of society. If infrastructure systems are corrupted, this could lead to the tampering of water, energy, nuclear,…

e-Portfolio Entry #12

How does cyber technology impact interactions between offenders and victims? With the mass advancements in technology and technology systems and the integration of social media applications and websites, the victim/offender relationship has changed in several ways. Before the development of technology and computers, most offenses such as bullying and sexual harassment were done in person,…

e-Portfolio Entry #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? In today’s society, computers, technology, and the internet have become a crucial part of millions of people’s everyday lives, from online banking, to social media, to everyday work. With all the benefits that…

e-Portfolio entry #10

How do engineers make cyber networks safer? Engineers that work within the IT and Cyber field such as network engineers help make networks safer by taking responsibility for the overall design and management of the network and security systems, as well as ensuring the the network is secure from cyberthreats such as malware and other…

Journal Entry #13

Two economic theories that come to mind when reading the breach notice letter are Rational Choice Theory and Keynesian Economic theory. In the instance of the letter, the company chose to use a third party company to operate their website, and as a result, the third party company was hacked, which led to a data…

Journal Entry #14

Of the 11 illegal activities mentioned in Andriy Slinchuks article, sharing passwords/addresses/photos, Collecting Information about children, Illegal searches on the internet, using unofficial streaming services, and Recording a VOIP call without consent seem to be the most dangerous. Sharing passwords is never a good idea, as it puts whatever account and information stored behind the…

e-Portfolio entry #9

Describe three ways that computers have made the world safer and less safe With society becoming more and more technologically advanced, the advancement and use of computers is becoming more and more common and necessary. While computers have certainly provided us with many benefits, and have made life easier overall, there are also risks and…

e-Portfolio entry #8

How can you tell if your computer is safe? There are several ways to tell and ensure that your computer is safe and help ensure it stays safe. Having a safe working computer is extremely important, as often personal, financial, and other forms of data can be stored on them. The first and most simple…

e-Portfolio entry #7

What are the costs and benefits of developing cybersecurity programs in business? With the ever increasing reliance on technology in all aspects of life and business, and the steady rise of cybercrime, the need for a strong cybersecurity program is more crucial than ever. For organizations that deal with personal or confidential patient or consumer…