Journal #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? We should approach the development of cyber-policy and -infrastructure in a proactive and adaptive approach given the “short arm” of predictive knowledge. This “short arm” of predictive knowledge is due to the rapidly evolving field of cybersecurity. A…

Journal #12

How does cyber technology impact interactions between offenders and victims? Cyber technology has greatly impacted the interactions between offenders and victims. Cyber technology has introduced many new challenges to crime and victimization. Some of these new challenges include the offenders’ ability to interact with the victim anonymously and from a distance, access victims at any…

Journal #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Criminal justice and cybercrime have a significant connection. Cybercrimes require advanced and unique criminal justice systems. Criminal justice systems have to continuously adapt in order to address cybercrimes as they continuously evolve. Some…

Journal #10

How do engineers make cyber networks safer? Cyber networks are extremely important in today’s world. Cyber networks are being used everywhere and everyday. This is why it is imperative that cyber networks are secure and safe. Engineers play a major role in ensuring that cyber networks are just that. Engineers make cyber networks safer in…

Journal #9

Describe three ways that computers have made the world safer and less safe. Computers have had a huge impact on the world. For the better and for the worst. Computers have made the world safer in many ways. Some of the ways computers have made the world more safe includes improved healthcare, improved transportation safety,…

Journal #8

How can you tell if your computer is safe? When using computers there is always the risk of having malware and other cyber attacks. However, there are many factors that can determine whether your computer is safe or not. Some of these factors include up-to-date software, firewall protection, antivirus software, secure passwords, and two-factor authentication….

Journal #7

What are the costs and benefits of developing cybersecurity programs in business? Many businesses are starting to develop cybersecurity programs. These new developments come with many costs as well as many benefits. A few costs that come with developing cybersecurity programs in business are financial investment, training, and risk assessment. A few benefits that come…

Journal #6

How has cyber technology created opportunities for workplace deviance? Cyber technology has created many opportunities for workplace deviance. Cyber technology has provided individuals with new tools and methods that they can use to engage in unethical behavior within the workplace. Some of these unethical behaviors are data theft, cyberbullying, misuse of company resources, organization sabotage,…

Journal #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Cybersecurity consulting Yacht security systems Bug bounty hunting Encryption services Risk assessment Security training Endpoint protection Cybersecurity auditing Unified security systems Regulatory compliance services Incident response services Threat intelligence platforms YouTube channel on cybersecurity tutorials

Journal #4

Compare cybersecurity risks in the U.S. and another country. When comparing cybersecurity risks in the United States with cybersecurity risks in other countries there are many factors we must consider. These factors include technological landscape, regulatory environment, and threat actors. Cybersecurity risks in the United States and the United Kingdom are quite similar. First, I’ll…