Journal #13

The development of cyber-policy and infrastructure is a challenging task, especially given the rapidly evolving nature of technology and the “short arm” of predictive knowledge. The short arm of predictive knowledge refers to the idea that we cannot always predict what new technologies or cyber threats may emerge in the future. Not knowing what may…

Journal #12

The largest thing that comes to mind is the anonymity of the offender using fake identities and IP addresses to avoid detection Making criminals that should be prosecuted much harder to track down and be brought to justice. Along with the increased ability to commit crimes and target victims for future or possible crimes. Cyber…

Journal #11

Cybercrimes are crimes that are committed just as normal crimes are, but they have computers or some sort of means to commit a crime that makes it a cybercrime. The overlap between criminal justice and cybercrime lies in the investigation and prosecution of cybercrime. These crimes can have a number of consequences, including financial loss,…

Journal #10

With cyber security being a constantly evolving field, engineers must stay up to date on the latest technologies and techniques to protect networks from cyber threats. Engineers play a critical role in making cyber networks safer by implementing strong security measures. This includes using firewalls, encryption, and intrusion detection systems to prevent unauthorized access and…

Journal #9

Computers and technology have made the impossible possible and the dangerous tasks have become safer. Safety is what people at a workplace usually tell you is their main concern, computers have made it possible with systems like automations. Removing most of the danger from the tasks of workers, reducing the number of injuries, thus increasing…

Journal #8

Today’s technological advancements do not come without threats, and ensuring that your system and computer is safe has never been more terrifying. However, there are several ways to tell if you are safe from cyber threats through all of your devices and networks. Anti-virus software is essential for cybersecurity and ensuring your computers safety. It…

Journal #7

Developing cybersecurity programs in business can bring both costs and benefits, and it is important for businesses to carefully evaluate these factors before making any decisions. The obvious financial aspects being the primary costs associated with developing cybersecurity programs. Purchasing software, hardware, and other security tools, on top of hiring and training of personnel, can…

Journal #6

Technology changes everything about our lives and has ultimately revolutionized the way we work, communicate, and collaborate in modern workplaces. However, this progress has also created opportunities for workplace deviance. Cyber technology provides employees with easy access to organizational information, networks, and data, which can be misused for personal gain or to undermine the organization’s…

Journal #5

C – Conducting vulnerability assessments and penetration testing for businesses Y – Yielding profit from cybersecurity training and education services B – Building and selling bug bounty programs for software vendors E – Engaging in cybersecurity consulting and advisory services R – Running and selling cybersecurity software solutions and products S – Supporting cybersecurity incident…

Journal #4

Comparing cybersecurity risks between countries is a complex task, as the risks and threats vary based on a variety of factors such as the size and type of businesses, technological infrastructure, government regulations, and more. The United States and China are both major world powers with highly developed technological infrastructures, and as such, they face…