Journal 7

Cyber technology impacts interactions between offenders and victims by proving that an offender that’s smart can constantly perform the offenses if they have the ability to. It makes it easier for the offenders and harder for the victims because it’s most of the time performed anonymously, so nobody will know who was doing it unless the IP address of the offender was recorded. Cyber technology also makes it harder for those to keep an eye on those who have been attacking because they could also change their username online and change up their profile entirely if needed. Interactions can also be constant until the victims get rid of what they’re being attacked on because the offender can just constantly search for related profiles or sniff through their packets to find out what their login info is and terrorize their account. Interactions can also become a lot worse because if something is posted on the internet that someone really does not want to be public, it can really ruin their life and possibly cause way more harm towards them than the attacker could possibly expect. The development of cyber-policy and infrastructure should be created in ways that help protect those who are consistently attacked. It becomes harder to create the development because technology is always changing and predictions are always being tossed out due to them. Cyber policies should be created so that if someone is caught being an offender over the internet, they should be taken off of wherever they’re performing it so that it helps create a safer environment for others. Employees and others in the outside world should also be taught training against phishing and social engineering since those are the two leading factors to the attacks. When it comes to infrastructure, it’s best to have an always up to date program that can help with monitoring and give alerts when there’s an attack going on. With everything changing, it’s best to make sure that backups always are in place because we never know what could happen to the victim.

Leave a Reply

Your email address will not be published. Required fields are marked *