Journal #13

The “short arm” of predictive knowledge refers to the viewpoint and ethical conduct of each situation being immediate, and, as there is no way to omnisciently know the future repercussions of the decision made, there is no way to evaluate the shortcomings of said decision. As we approach the development of cyber policy and cyber…

Journal #12

Due to cyber technology, offenders and victims have the possibility to interact through the cyber medium rather than in person. This leads to new challenges for defining stalking and harassment and providing safety for victims and gives ease to potential offenders finding their potential or current victim. The first impact upon interactions between victims and…

Journal #11

Due to the increase in use of personal computers and increasingly easy access to information regarding hacking and other criminal, fraudulent activities, criminal justice and cybercrime are continuously becoming more integrated. From personal to business interactions, humans are trending toward the use of computers in their day-to-day operations. Significant amounts of criminal activity can be…

Journal #10

Systems engineering is a collection of system life cycle technical and nontechnical processes with associated activities and tasks. Systems engineers apply engineering analysis and design principles to design a system that will satisfy stakeholders’ requirements and critical quality properties. There are many specialties associated with system engineering that combine to produce a capable, secure system….

Journal #9

Computers have evolved tremendously over the past few decades, making large leaps in the recent years. Computers offer access to the outside world and create ease in passing information from person to person in a way that was never thought to be possible upon their arrival into the world. The dark side of computers exists…

Journal #8

Digital threats are consistently looming in our society where Internet connectivity and usage is paramount, not only in business but also for pleasure. With this reliance upon constant connectivity, there rises the issue of “safety” for users. Threats to security presents in an array of ways such as ransomware, viruses, phishing, and more. How can…

Journal #7

When considering the costs and benefits of developing cybersecurity programs in business, it is easy to see how the benefits outweigh any negative outcome referencing cost. When companies are creating a budget, they must consider costs for implementing and up-keeping a cybersecurity framework. Many frameworks are required per the government in order to keep sensitive…

Journal #6

Workplace deviance is a malicious attack described as having the deliberate desire to cause harm to an organization- more specifically a workplace. This harm could affect the functionality of an organization, as well as cause financial strain. The in-depth knowledge of computer systems required to be employed within the field of cyber security allows for…

Journal #5

Check for vulnerabilities within software Yack about cybersecurity at a public speaking Business owner Ethical hacking Risk analysis Systems engineer Educating others in cybersecurity Create a secure app Using packet sniffers to scan a network Remove bugs from a software Installing antivirus software Testing penetration Yield security holes from vulnerability scans

Journal #4

There is a prevalent gap in cyber crime rate monitoring that is currently being attempted to be addressed. In doing so, a cluster analysis is being performed on 190 countries from around the world measuring spam, malware, fraud, piracy, the country’s GDP and internet connectivity. The two former measurements have been proven to strongly correlate…