ePortfolio Entry #13

The ability to predict the future is slim to none in the cyber world as the only measure along those lines that can be taken is borderline guesses and assumptions. On account of this limitation, cyber policies and infrastructure should be modified on a day to day basis from the happenings occurring at that time….

ePortfolio Entry #12

In the current state of society, new, completely digitized interactions that make up the relationship between a cyber offender and a victim is the sole basis of the dyad. In the not too distant past, crime was only present within the physical space but now it has intruding into the digital space as well. An…

ePortfolio Entry #11

Since the introduction and boom of personally accessible technology, most to all everyday actions are now bound to our phones, computers or some piece of technology in some manner. This worldly development between man and machine can also be translated to the world of crime. One legal scholar’s definition of cybercrime is that “cybercrime… consists…

ePortfolio Entry #10

There is always room for improvement regarding the security of cyber networks and systems. Cyber networks constantly communicate within the system on their status, if they’ve been attacked, and what they need to function with the purpose of the creation of updates to at a less vulnerable state. The cyber networks being created by engineers…

ePortfolio Entry #9

With the introduction of computers to the world, there is an increased level of safety through the means of assistance in the search for offenders, advanced medical information technologies, as well as the strengthening of international relations. The storing of data and certain information that is quickly accessible gives law enforcement an advantage in the…

ePortfolio Entry #8

In the 21st century, computers have changed the way we function in our daily lives. With changing the fundamental approach to almost everything we, as a society, do the computer has solidified its status as a world altering invention. This invention, at its genesis, was intended for making calculations and performing simple tasks. In the…

ePortfolio Entry #7

In the 21st century businesses have an obligation to develop cyber security programs in order to protect their customer’s and ultimately the company’s own information. There are benefits as well as costs regarding investments into a cybersecurity framework for a company. Initially, there is a baseline of fundamental costs regarding devices for the company security…

ePortfolio Entry #6

Within the workplace, the employees are the driving force that creates successful situations for a business. In the average employee’s mind they are aware of the several risks that may make their way onto a work computer. In this day and age, technology and business coincide and personal security of these employees can translate to…

ePortfolio Entry #5

Creating a next level protection software and marketing it. Yahoo is experiencing a multitude of breaches and they need an individual to change and test their system. Build a hardware firewall for a businesses network. Encrypt codes for a company that needs to send a private message. Recommending several courses of action for a company…

ePortfolio Entry #4

In the United States, the country at the top of the list regarding hosting malware, botnets, phishing server hosting, and amount of botnet command and control (C&C) servers, we as a country face numerous cyber threats per day. Most of these threats come from spam sent to emails most of the time through what’s known…