How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? We can approach this by coming to the realization that no one is safe essentially. Cyber attacks always strike when least expected. So it is more than essential to be prepared for the worst. Enforcing a cyber-policy can…
Journal entry #12(week 13)
How does cyber technology impact interactions between offenders and victims? I personally feel that victims of online offenders would not even be aware of their offender in a public setting. Due to the fact that offenders like to hide behind a certain persona online, that does not give away their true identity. Online however is…
Journal entry#11(for week 12)
Criminal justice and cybercrime in this day and age practically are a packaged deal. Cybercrime is literally everywhere, and as technology slowly becomes a part of our every day lives, and inserting itself into our routines, the risk of cybercrime grows. Thus making everything we do dealing with technology a threat to our own security….
Journal Entry #9 (for week 10)
Three ways computers have made our world safer is the fact that it is easier to get in contact with people and communication, especially when you think of emergency situations communication is very neccessary, as well as for our everyday lives communication come in very handy. Another way is with modern medicine. Doctors have use…
Journal Entry #7
We are all aware that small businesses don’t start off with as much money as large coporate businesses and have a much smaller budget, so it is very understandable when small businesses decide not to invest in cybersecurity programs. However the cost of a cyber security attack is far more costly than the investment itself….
Journal Entry #6
Cyber technology has created opportunities for workplace deviance in countless ways. Before workplace deviance was harder to execute before the advancements in technology. It was easier to catch someone committing workplace deviance because at first there were not so many avenues one could use online, it was more so in person with physical documents, which…
Journal Entry #5
C-create affordable yet effective protective software for the average person to purchase Y-Youth training program in teaching young teens that are interested in cybersecurity B- Become a cybersecurity expert for a corporate business E- Encryption services for high profile personalities(celebs) R-Restoring files or lost information, for victims of a cyber attack S-Self Recognition as an…
Journal Entry #2
Four majors at ODU that relate to cybersecurity are Computer Science, Computer Engineering, Cybercrime, and Information Technology. Computer science deals with the development of software and hardware as well as artificial intelligence thus focusing on how to make the best soft/hardware that provides reliable programs that work for the user as well as keeping them…
Journal #1
As we advance into a more technological world, where everything is being placed on the web, I’d like to be a part of those who help make the web a safer place. That’s what stoked my interest in Cybersecurity Technology.