Create business to provide consultation to small businesses Yankees Cybersecurity Manager Betting software engineer Ethical(White hat) Hacker Remote network analyst Security consulatant Engineering Technician (My current job title) Centrix Unix technician Remote help desk technician IPS installer Tip software creator Youtube vulnerability technician
Category: CYSE 200T
How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
The “short arm” of predictive knowledge refers to the principle that while judgements can be made on new policy in the short term, it is impossible to tell the future ramifications of an action. This means that despite the best intentions, no one can tell for certain whether a policy will have positive effects on…
How does cyber technology impact interactions between offenders and victims?
Cyber technology opens doors for cyber criminals to exploit victims. As cyber technology advances, the ways in which an offender can commit crimes increases. One example public Wi-Fi. Free public Wi-Fi is becoming the standard for most places. Wal-Mart, Target, Starbucks, Malls, Outlets, McDonalds, hotels, and hundreds of other places all have unsecure Wi-Fi hot…
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
There is a lot of overlap between cybercrime and criminal justice. Cybercrime is crime carried out over the internet or network systems. Criminal justice is the discipline that oversees the creation of laws, persecution of criminals and rehabilitation of prisoners. Unsurprisingly, law enforcement agencies have had issues fighting cybercrime. The internet is massive and grows…
How do engineers make cyber networks safer?
Cybersecurity engineers are the personnel responsible for keeping their networks safe. They have many ways of achieving this. The first is the management of the cybersecurity suite and software. When I was in the Navy, we used a McAfee suite called HBSS or Host Based Security Systems. This was an agent that hosted our Host…
How can you tell if your computer is safe?
The easiest way to make your computer completely safe with no questions is to shut it off, disconnect it from the network, remove the battery and hard drive, stick it in a metal box and weld the box shut. If you want to take it a step further, you can drop the box in the…
What are the costs and benefits of developing cybersecurity programs in business?
At a recent cyber security convention, I attended one of the keynote speakers lamented about how a trend seen recently in businesses is that they view cyber security as an insurance policy rather than a necessity. They do not believe that the costs of proper cybersecurity protection can be too high, and it is not…
How has cyber technology created opportunities for workplace deviance?
Cyber Technology has created many opportunities for workplace deviance. An increased reliance on cyber technology has created an abundance of vulnerabilities for companies. Insider threat, both malicious and not, is at an all-time high. Unauthorized access to files is a huge issue, and it is not always the fault of the user. When I first…
Compare cybersecurity risks in the U.S. and another country.
As the cybersecurity industry continues to evolve, different countries face different challenges. Rather than comparing the challenges faced in the United States to a rival country such as Russia or China, I thought it would be interesting to use a smaller country such as Panama. When it comes to development the United States is way…