Journal Response #13
How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Cyber attacks are on the rise and it becomes ever more important for companies to really assess what kind of cyber protection they have and take a deeper look at potential vulnerabilities that can hurt the company. Other than…
Journal Response #12
How does cyber technology impact interactions between offenders and victims? Cyber technology has significantly impacted how offenders and victims interact. The internet has brought forth a completely new market for criminals to exploit and attack victims. Interactions between offenders have with their victims can now be completely hidden until there is too much damage, the…
Journal Response #11
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? To start off I would like to say throughout this class I have notices a large number of trends correlating the information learned in this class to my criminology class “introduction to criminology”,…
Journal response #10
How do engineers make cyber networks safer? Engineers or in this case Cyber engineers are constantly on a mission to make our cyber engagements safer and easier to use. Cyber engineers identify threats and vulnerabilities in systems and software, then apply their skills to developing and implementing high-tech solutions to defend against hacking, malware, and other cyber…
Journal Response #9
Describe three ways that computers have made the world safer and less safe. There have been many ways that computers have made us both safer in some areas while less safe in others. For example some ways that computers have made us safer is quicker access to emergency services such as the police, ambulance, and…
Journal Response #8
How can you tell if your computer is safe? In todays world it is essential to have a strong cyber security defense and a safe computer. Having a safe computer means many things, you know all of your personal information is safe and nobody is deleting or stealing assets or files. There are many types…
Journal Response #7
What are the costs and benefits of developing cybersecurity programs in business? Cyber attacks and other security breaches can costs millions for businesses depending on the severity of the attack. So developing a cyber security program is an essential aspect in protecting your companies property and money. Some more benefits in developing a cyber security…
Journal Response #6
How has cyber technology created opportunities for workplace deviance? The age that we live in where everyone and everything’s personnel information is online has created a whole new mass of threats. One of those threats being workplace deviance, workplace deviance has multiple meanings in cyber security it is defined as a deliberate, malicious attempt to…
Journal Response #5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Create app that acts as an ad-blockerYacht GPS software that is secureBecome a lead software security engineerEnter small business that helps organizations with cyber securityRouting and switching Security architectEthical hackingCreate a new software that innovates cyber defenseUse entry level skills to become…