We should approach the development of cyber policy and infrastructure the short arm knowledge way by allowing companies and businesses to read up on cyber policy. And tell them how not reading and comprehending cyber policy can cause an unsuccessful attempt to protect their business. When companies read these policies, it will allow them to…
Journal #13
The way cybertechnology impacts the way that offenders and victims interact would be that now a days it is easier for an offender to get a hold of their victims. With the new advances in technology everyday it makes it easier for offenders to be able to harass their victims especially on social media all…
Journal #12
The overlap between criminal justice and cybercrime would be that both can possibly be seen as organized crime. With technology advancing more and more everyday cybercrime is slowly but surely rising. Rising as we speak, especially here in the United States where we have the highest rate of cybercrime and cyber-attacks and with Russia and…
Journal #11
The question being asked is “How do engineers make cyber networks safer?” And the answer to that question would have to be that engineers make sure that no one is gaining any unauthorized control to the systems that they are working on. Other ways that engineers make cyber networks safer would be that they work…
Journal #10
Three ways that computers have made the world safer and less safe would be through communication, education, and cybercrime. Communication through computers have made the world a safer place by allowing us to be able to spread awareness through computer systems. For example, if a child was missing, we would be able to receive an…
Journal #9
The question of “How can you tell if your computer is safe?” is one that needs an eloquent answer. You can tell if your computer is having trouble by checking to see if there are any viruses on the computer. Checking for viruses is just a step to see if anything is going on with…
Journal #8
The cost and benefits of developing Cybersecurity programs in business would be that their businesses are secure and aren’t at risk of security breaches. With that being said the benefits of developing these types of programs are like I said are to make sure the business is secure, make sure there are no breaches and…
Journal #6
The way that Cybersecurity Technology has created opportunities for workplace deviance is by way of white-collar and cybercrimes. With white collar crimes as per the notes form the module describes this form of crime as being the most elite type of deviance. This category of crime allows for the crime committed in tech to occur…
Journal #5
C – Creating a software program Y- Yearly check up’s on systems ( saves money) B- Being an independent consultant E- Ecommerce R- Ransomware ( helping people get out of it ) S- Security Breach software E- Engineering C- Cryptographer U- Using Knowledge of Cybersecurity to teach others R- Rent out software programs I- Information…
Journal #4
In this post I will be comparing cybersecurity risk in the United States and other countries. First thing I would like to bring light to would be that the United States is targeted the most when it comes to phishing attacks. As per the module reading from Kilger (2016) the United States, China, Brazil, Russia,…