I think that we should approach the development of cyber-policy and infrastructure in a very cautious way. We should take what we have learned over the past few decades about some of the shortcomings in technology and learn to be better than to allow bad things to happen to the best of our abilities. Unfortunately,…
How does cyber technology impact interactions between offenders and victims? (A12)
Technology impacts the interactions between the offenders and the victims in many ways. For one, offenders are able to commit crimes from anywhere around the world to a victim who lives anywhere else around the world without being physically seen. The offenders can take as much money or information from their prey as they want…
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? (A11)
Cybercrime and criminal justice overlap where cybercrime is an area of study within the domain of criminal justice. Criminologists do a good job of defining what would be deemed as illegal and unethical. This includes really intricate policies with even more intricacies within that determined crime. Cybercrime is not quite easily defined as a black…
How do engineers make cyber networks safer? (A10)
Engineers make networks safer by continuously monitoring the network when everyone else is not. Engineers are the network’s foundation and they are always spot-checking and testing the networks to ensure that they are running properly and safely. Engineers ensure that only properly authorized individuals are accessing the network and are using the network in a…
Describe 3 ways that computers have made the world safer and less safe (A9)
1: Computers have enabled the over interconnection of people, there is a lack of privacy. Cyberstalking is on the rise. Criminals are much more equipped to electronically stalk people and obtain their information. People on social media platforms with enabled location settings are much more susceptible to being stalked. This poses a serious issue where…
How can you tell if your computer is safe? (A8)
You can tell if your computer is safe in a few ways. One way would be to ensure that all devices, drivers, and updates are always current and up to date. Installing a really good computer security system will help malware to walk its way into your computer, thus ensuring that your digital assets are…
What are the costs and benefits of developing cybersecurity programs in business? (A7)
Cybersecurity programs have a lot of costs as well as benefits in the business atmosphere. For one, a huge cost is an implementation. Costs to a cybersecurity program include, but are not limited to cybersecurity professionals that need to be hired, backup system hard drives, network security, IT specialists, etc. There are a lot of…
How has cyber technology created opportunities for workplace deviance? (A6)
Cyber technology has created many opportunities in the workplace. Criminals are empowered through the anonymity of the digital world to commit theft by exploiting businesses’ accounts. The cyber technological world has seen a departure from people physically being present to commit a crime, to a crime being committed from around the world. More deviance lies…
Why are you interested in cybersecurity technology? (Assignment 1)
I am interested in cybersecurity technology as I have always been fascinated with computers, electronics, and the ability to access so much information from just a few clicks and keystrokes of a keyboard. I will not omit; I fantasize being an ethical hacker and try to fight crime like we all see in tv shows;…
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.
Cryptographer YMCA Systems Security Administrator Blockchain Engineer Engineer for Network Security Regional Security Architect Security Analyst Entry Level Cybersecurity Specialist Cybersecurity Manager Unmanned Aerial Vehicle GPS Security Research Engineer of Cybersecurity Information Security Officer Tester of Security Penetration Y-Coin Crypto Mining
Compare cybersecurity risks in the U.S. and another country
America is more vulnerable to certain risks than other countries, while being the leader in security for other areas. For instance, America suffers approximately 60% of the worldwide attempts of phishing. When phishing attempts are successful, Americans lose about $2,000 and businesses around $20,000. While we are among the highly exploited victims to phishing attacks,…
Describe four ethical issues that arise when storing electronic information about individuals.
One issue regarding the storage of other peoples’ information via electronic means is that the information can be accessed virtually by anyone. Privacy is lacking when peoples’ information can be accessed and even then, sold after obtained by someone who should not have accessibility to that information. This is a massive issue that has laws…
4 Majors Related to CYSE That ODU Offers:
Four majors that ODU offers that relate to cybersecurity are Computer Science, Cyber Operations, Cybercrime, and Computer Engineering. CS: Computer Science teaches code writing like python, C++, and HTML in order to create software and applications. These applications are then used toward every day usage of computers. This code and language use can make a…