Journal Entry 12

With the development of cyber technology over the years, there are many differences and changes in the ways that offenders and victims interact with one another. Technology has made it easier for individuals to communicate with one another whether that’s through social media, email, phone calls, etc. Anyone whether you know them or not can contact you over the internet if they can find a way to access a profile or contact information just as someone can run into you at the store. This transcends the same meaning as offenders being able to target anyone they come into contact with and victimize can just as easily do so with access to cyber technology. With anyone’s email being able to receive contact from someone, victims are made every day because of attacks like phishing. Luckily technology has gotten smarter and bolstered its security measures by detecting scam emails and messages and sorting them into spam. However, some emails get through and prop;e make the mistake of clicking on risky links, images, or handing over information to someone masking their identity as a reliable company that has ties with the individual. Companies and services that utilize this form of communication also label certain things as dangerous and put out examples to help users identify a possible offender looking to claim its next victim. Just as you see wanted posters for a criminal in the real world, this works the same way by alerting the individual with examples and descriptions of the offender. Some offenders use weapons through the internet such as malware and ransomware to attack companies and people to get things they want such as information, money, leverage, or anything a criminal might want. Just as an offender in the real world uses a gun or a knife as a way of getting what they want, cyber technology is the tool criminals use online.

Leave a Reply

Your email address will not be published. Required fields are marked *