Journal #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?  The development of cyber policy and infrastructure should be looked at to be updated every year because of how important these are to a system. As technology grows and the people who adapt to it, there will be…

Journal #12

How does cyber technology impact interactions between offenders and victims?  Cyber technology creates a platform for offenders and victims. The internet plays a big role as a communicator between the two. With the internet, you are able to connect and communicate with people all across the world. Some communication and connection may be unwanted from…

Journal #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?  With new technology and people getting smarter, there has been advancement in the use of crime associated with technology. Technology is starting to become a place where multiple crimes are committed and there…

Journal #10

How do engineers make cyber networks safer?  Engineers make cyber networks safer because they use proper hardware and digital software to keep the network safe. Engineers have an important objective to make the system safe and can be trustworthy. Another factor is making sure they are able to implement these critical systems while making sure…

Journal #9

Describe three ways that computers have made the world safer and less safe. Computers are a blessing and a curse. With the new world going towards technology, we get some good things that can help with the world, and we also get the very bad things that come with computer technology. Let’s start with all…

Journal #8

  How can you tell if your computer is safe? It’s hard for a computer to be completely safe unless you are a expert in cyber security. There are many ways to secure your computer but there can always be loopholes in your system that you are not aware of, such as not updating your OS…

Journal #7

 What are the costs and benefits of developing cybersecurity programs in business? Cyber security programs in business are crucial to create a safer way to operate your business, especially if your business begins to grow and expand. Data breaches are popular among big companies that hold valuable data such personal information of customers. In a…

Journal #6

How has cyber technology created opportunities for workplace deviance? Cyber technology has created opportunities for workplace deviance because employees have access to the inside and create an easier way to cause deviance when nobody is thinking to look at you to cause deviance in the workplace. There are rules in restrictions in the workplace to…

Journal #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  legal ways to make money in cybersecurity.  Creating VPN app  You can manage a company security architecture  Become a Youtuber and talk about Cyber security  Ethical hacking to test companies’ security  Reach out to companies to help them improve…

Journal #4

 Compare cybersecurity risks in the U.S. and another country. Cyber risks are increasing all of over the world at a rapid rate in all different countries. Countries are starting to invest into cybersecurity because of the advanced technology that is coming and the amount of people learning this technology. United States is one of the…