Cyber policies set the standards for any acceptable behavior that occurs over any network. Whether it is social media or web browsing, there are set standards that are meant to be kept to. As time goes on, it is simply important to continue to update and tweak these policies to continue to have regulation over…
Journal 12
The improvements made to cyber technology over the years has come with many good improvements to society and many bad things that affect people mentally. When it comes to interactions between offenders and victims, there is almost no restrictions. Offenders are able to easily target people solely through the internet. The use the internet has…
Journal 11
Criminal justice and cybercrime certainly have some connections. For the most part, technology plays a huge role in crimes. Most crimes that are committed in today’s age are mainly through some form of technology. Like a regular crime such as robbing a bank, if you commit a cybercrime, you will be punished the same way…
Journal 10
Engineering and networking are two topics that can work together hand in hand. Engineers are always looking to improve these cyber security systems for the best experience for the users. With the constant updating and tweaking of what goes into these network systems and the improvement of security constantly, it helps to fend off hackers…
Journal 9
In the world today, there isn’t anything that is done that doesn’t include the involvement of a computer. Computers have made things in this world hundreds of times easier for people. There have been several benefits, but with those benefits, there are several negatives. With the positives, that computers have made there are numerous examples….
Journal 8
Computer saftey has become such a vital thing in the world today. In terms of making sure that your computer is safe, there are many ways to do so. Firstly, making sure that your computer is password protected. Password protecting your computer should be one of if the the first thing that’s done to protect…
Journal 6
“Workplace deviance behaviors are acts based on intentions to cause damage, discomfort, or punishment to the organization or other individuals within the organization” (Google). In the workplace, deviance is something frowned upon and should always be avoided. Intentionally slowing down other coworkers or even going to lengths to sabotage coworkers just isn’t right. The way that…
Journal 5
Create a secure tutoring app service for students Yacht software that allows the boat to drive itself Build a program that automatic grades work for teachers Exploring new cyber protection methods Ransomeware protection on all coputers Secure app that helps people track their budget and finances Encryption of information on a computer with one click…
Journal 4
In today’s world, Cybersecurity is a practice that is vital no matter the country. It can be argued that in some it is more valuable than others. Considering Cybersecurity is the practice of protecting computers, phones, networks, and things of that nature, with a growing world and mountains of information being poured into it, it…
Journal 3
When companies and agencies want to store information, specifically consumer information, there becomes an argument about ethics. Like anything in this world, saving information about consumers has to be looked at from an ethical sense. Yes, saving the information to a cloud for example will make retrieving data easier. The concern comes from who exactly…