Journal #13

How we should approach making cyber policies with not a lot of predictive knowledge is to make sure that every cyber attack is properly recorded and monitored by someone. By following the trends of attacks, new ways on how to approach threats can be more easily dealt with and predicted. By learning what could be…

Journal #12

Offenders are able to harass and stalk individuals anonymously making it hard for authorities to catch them. Cyber technology affects the victim more than the offender. Because anyone can utilize the internet from anywhere offenders can be anywhere in the world when interacting with the victim. Also because o the lack of physical contact, the…

Journal #11

Need criminal justice because criminals are using technology to commit crimes.

Journal #10

Engineers make cyber networks safer. They need to do this because if an attacker attacks it could put a pause on the business

Journal #9

Computers made the world safer by people no longer to need to use paper and send digital documents to a doctor for example. This can prevent the loss of documents and to have proper information of the person so that they could be cared for better. Technology has also made it better for people to…

Journal #8

There are many ways to tell if your computer has a virus. If your computer suddenly starts to act slower than usual. The user could also experience apps crashing or that their computer is frequently freezing. That could be because of a virus that is using a bunch of CPU or data. A solution for…

Journal #7

The benefits of implementing a good cybersecurity program are that if they work correctly the business work have to go through and pay for the high amount of cost that they would have had to pay if a cyberattack were to happen. According to an article from Mdsny “The Cost Of Cybersecurity And How To…

Journal #6

Technology like phones deviated people in the workplace can take pictures with the phone of files and then send them to whoever needs them. With some companies allowing their employees to bring their personal devices at work, these employees are able to take pictures or download important information to their own devices. Without a detection…

Journal #5

Create app that rates software.Yacht GPS software that is secureBlock attackersEthical hackerReport and monitor cyberattacksSoftware architectEntering detection softwareCloud consultantUndoing malwareRisk managerIdentity managerTraining employeesYearly statistics reports that show everything

Journal #4

The United States and the United Kingdom share many cybersecurity threats. The first risk they share is the growing increase in data breaches. From the RSM article “Comparing US and UK cyber security risk perspectives” statistics show that the United States had 72% of their business experience a data breach, and the United Kingdom with…