How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Cyber policies are extremely important as it regulates and sets the standard of behavior for activities on the internet. Cyber attacks are continuously on the rise and the inevitability of falling victim to a cyber attack should prompt…
Entry #12
How does cyber technology impact interactions between offenders and victims? The internet opens countless doors for offenders to continuously harass their victims. Cyber technology has escalated unwanted interactions between victims and perpetrators since everything is essentially done through the screen and perpetrators can have access to their victims at any time of any day. These…
Entry #11
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Criminal justice is best defined as a structure of laws, rules, and procedures that are executed to those who have committed crimes. Cybercrime can be defined as the act of committing a crime…
Entry #10
How do engineers make cyber networks safer? Cybersecurity engineers play a critical role in maintaining the integrity and security of cyber networks. Cyber networks are always vulnerable to malicious attacks and thus can never be too secure. Engineers are responsible for solving and avoiding any form of potential vulnerabilities cyber networks may have. Not only…
Entry #9
Describe three ways that computers have made the world safer and less safe. The impact of technology and computers continue to grow more and more each day. As technology advances, it has made the world a safer place in certain aspects. In regards to home security, the creations of at-home security systems such as ADT,…
Entry #8
How can you tell if your computer is safe? With the number of cybercriminals on the internet, computers are extremely susceptible to hackers, viruses, phishing attacks, malware attacks, and much more. It is important to know whether one’s computer is safe and protected from such attacks. A way to test your computer’s safety is to…
Entry #7
What are the costs and benefits of developing cybersecurity programs in business? Although cybersecurity is extremely important in protecting a business’s assets and information, it does come at a cost. One of the main costs of installing a security program is the initial setup. First, businesses have to first analyze what form of attack they…
Entry #6
How has cyber technology created opportunities for workplace deviance? The term deviance refers to actions or behaviors that depart from usual or accepted societal standards. Workplace deviance is the deliberate desire to cause harm to an organization by causing problems within the workplace. Cybertechnology has made workplace deviance even easier to occur within the technology…
Entry #5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity: Create your own cybersecurity companyYield personally created cybersecurity programs Become a cryptographer to develop encryption algorithmsEventually create a cybersecurity educational program for kids Refer tech companies to cybersecurity firmsStart your own independent consultation with tech companiesEvaluate and further develop car…
Entry #4
Compare cybersecurity risks in the U.S. and another country. Contrary to popular belief, the United States is actually not the best nation with cybersecurity. Although it is definitely above average, the U.S was only ranked fifth in a study comparing 59 other nations in terms of cybersecurity. Japan, France, Canada, and Denmark were ranked higher…