Scott Cook CYSE200

Cyber Security 200

Month April 2020

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

In todays world we do not have the ability to predict the future of the cyber world. We can only have small guesses of what will happen in the near future. This means that the cyber world should try to… Continue Reading →

How does your major relate to cybersecurity technology?

My major is cyber security. Cyber Security is the process of making the web a safer place. This is down in multiple ways such as installing software, firewalls and other security devices on the web in order to ensure they… Continue Reading →

How does cyber technology impact interactions between offenders and victims?

In todays society due to the advancements of cybercrime in the world the relationship between victim and attackers has changed. In the past a crime was committed in person face to face. One example would be robbery, robbery in the… Continue Reading →

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

I believe the overlap with criminal justice and cybercrime will only continue to grow as time goes on. In todays world crime is becoming more and more regular to be committed online rather than in person. This trend means it… Continue Reading →

How do engineers make cyber networks safer?

Cyber security networks can always be improved in order for maximum safety for the user. Cyber networks often keep in touch with other users to find out how they were attacked so they can make updates and be less at… Continue Reading →

What are the costs and benefits of developing cybersecurity programs in business?

Cyber security set up is extremely important for business. They can protect companies information from hackers and from human error. Setting up cyber security programs can be costly though. One cost would be initial set up this would include hiring… Continue Reading →

How has cyber technology created opportunities for workplace deviance?

Deviance is described as “the fact or state of departing from usual or accepted standards, especially in social or sexual behavior.” Work place deviance can occur easily in the cyber technology field since the deviance could happen through the web… Continue Reading →

Different ways to make money in Cybersecurity

Create app that rates software. Yacht GPS software that is secure Blocking hackers from attacking a company Ecommerce security Rent out a space to a cyber security company Set up a firewall for a website Eventually create your own cyber security company Car… Continue Reading →

United States vs. other countries cyber risk

Across the globe every country has some degree of cyber security risk. The United States of America and Canada have placed cyber security systems in place in fear of getting hacked from an unauthorized user in a enemy country. This… Continue Reading →

Ethical issues when storing personal information

Many ethical issues could occur if someone is storing information about other people in an electronic saving file and that file got hacked. One of which would be the persons health history would be potentially realesed into the world which… Continue Reading →

« Older posts

© 2025 Scott Cook CYSE200 — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑