In the cybersecurity field it is crucial that we have a solid cyber-policy. The cyber-policy or infrastructure is helpful for many organizations and businesses. But as time changes and technology is improving and advancing it we have developed predictive knowledge. The predictive knowledge using “short arm” is a viewpoint where they estimate or predict because…
Category: IT/200T
Journal #12
In today’s time cyber technology has changed the whole easy crime was committed or even down to the offender and victim. Before the advancement of cyber technology crimes were done face to face or in person. Every year since the computer came out crimes have changed completely. From simple telephone scams to people hacking and…
Journal #11
When understanding Cybercrime and criminal justice they most often go hand and hand. But first you have to have a clear understanding of both cybercrime and criminal justice. Cybercrimes are crimes committed/done in the cyber world. For example, if someone was to bully someone on social media. This example is also an example of cyberbullying,…
Journal #10
Engineers have one of the most important jobs when it comes to keeping networks safer. So when discussing how engineers keep networks safe I’m going to stay more focused on network engineers. A network engineer is someone who specializes in maintaining, designing, and troubleshooting technological devices (Joshi). According to EMERITUS, “Their tasks include configuring and…
Journal #9
Describe three ways that computers have made the world safer and less safe. The world has evolved so much with the help of computers. Computers have changed the ways of communicating with one another, storing and taking photos and videos, how we buy/sell products, and plenty more ways. But also having computers came with a…
Journal #8
1. How can you tell if your computer is safe? While having a computer is fun and very useful a person alway has to do it safely. It can be pretty tricky to tell if your computer is safe or not but there are plenty of ways to check. Even if you’re not an IT…
Journal #7
1. What are the costs and benefits of developing cybersecurity programs in business? When looking at the benefits of cybersecurity it’s pretty obvious that it’s needed in a business. But sometimes people who own the business or that’s part of the business forget to look at the cost of cybersecurity. Now when determining the cost…
Journal #6
To start off deviance means “the fact or state of departing from usual or accepted standards, especially in social or sexual behavior” (“Oxford Languages and Google – English | Oxford Languages”). So when viewing how workplace deviance can happen in the cyberfield it can happen easily because it doesn’t have to be face to face….
Journal #5
Create app that relates software. Yacht GPS software that is secure. Becoming a ethical hacker. E-commerce security. Rating company security systems and telling them how to improve them. Setting up your own cyber security company. Entry level cyber security technologist. Chief Information Security Officer (CISO). Uniting companies to report cyber criminals to help improve security…
Journal #3
When looking at ethical reasons why problems arise when storing electronic information about individuals there are four main reasons. The four main reasons are privacy and confidentiality, security breach, system implementation and data inaccuracies. Each of these reasons are difficult to be kept disclosed from other people or companies. Special when looking at privacy and…