Journal #13

Navigating the ever-evolving landscape of technological threats and the complexity of cybersecurity demands a strategic approach. While daunting, it’s not impossible, it requires agility, adaptability, and cooperation. Collaboration among governments, private sectors, and international entities facilitates the sharing of critical intelligence. This collective awareness enables a fast response to emerging threats, mitigating potential damages. Investment…

Journal #12

Cyber technology has significantly transformed interactions between offenders and victims in various ways for example digital access to victims. Offenders can now easily access potential victims through various online platforms such as social media, online forums, or dating apps. This easy access increases the likelihood of offenders identifying and targeting vulnerable individuals. First, one of…

Journal #11

The overlap between criminal justice and cybercrime has become increasingly significant as technology has become more integrated into our daily lives. Cybercrime refers to criminal activities carried out using computers and the internet, such as hacking, identity theft, fraud, and online harassment. This overlap with criminal justice occurs in several ways. Some of these include…

Journal #10

Engineers play a vital role in enhancing the safety and security of cyber networks through many different approaches encompassing various techniques, technologies, and strategies. One aspect involves introducing sophisticated encryption protocols to safeguard sensitive data from unauthorized access. By using these advanced algorithms that engineers created people can ensure that data transmissions remain encrypted, leaving…

Journal #14

The five violations people do without knowing they are illegal that I believe are the most seriousare collecting information about children, sharing passwords, addresses, and photos of others,bullying and trolling, using other people’s internet networks, and lastly Using unofficial streamingservices. I chose these five because they have the most potential for serious financial, personal,and professional…

Journal #15

The speakers pathway into digital forensics was mainly from connections. First, he was an accountant, while he was at his accounting firm they needed a technology expert to help out with some of the devices. He was willing to take up the extra job. While he was working both jobs he ended up falling in…

Journal #9

Computers have changed the world in many different ways, some good ways and some bad ways. I would say that they have changed the world for the good even despite all its downsides.  The first example of how computers have changed the world for good is that, computers have enhanced how people talk to other…

Journal #8

There are many things you can do to tell if your computer is safe. However, the first step is to keep your computer safe from malware or a direct cyberattack in the first place. Here are some examples of what to watch out for.  Making sure your computer is up to date on its updates…