Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?
Researchers might use this information to study breaches to try to see if they can find a pattern to the hacks/breaches. Find patterns can be very beneficial because if they are found it can give people a heads up on what to look for. It also gives people a chance to change how stuff is…
Article 2
Article Review 2: The article I decided to review is “Cybercrime Laws in Iraq: Addressing Limitations for Effective Governance.” The author of this journal is Nashwan Mohammed Suleiman, Ahmed Hatim, Mohamed Amer Alseidi, Karrar Shareef Mohsen, Wesam Khalid Abd Al Aali, Alaa Hussein Abdulaal, Mustafa Asaad Rasol, Abdulnaser Khalid Hamzah, Khudr Bary Freeh Alsrray. The…
Article Review 1
Article Review 1 The article I chose to review is “Juridical Review of Copyright Infringement in the Use of Deepfakes in the Creative Industry in Indonesia.” The article was written by Daniel Hendrawan, Christian Anderson, Demson Tiopan, Shelly Kurniawan, and Maya Malinda. This article takes a deep dive into the law including deep fakes/artificial intelligence….
Explain how the principles of science relate to cybersecurity
There are believed to be certain principles that natural and social sciences follow. These principles are known as scientific principles. It has now been concluded that cybersecurity is put through scientific principles since it relates to social science. The connection between cybersecurity and social science can be connected through the idea/principle of relativism which simply…
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
After reviewing the NICE Workforce Framework website I believe there are a few areas that I would want to focus my career on. The first area that grabbed my attention was cyber investigation. The investigation area is described on the website as being the investigation of cyber events/crimes that involve crimes or criminal activities. Personally…
How does cyber technology impact interactions between offenders and victims?
Cyber technology has given offenders more power and a larger platform to use to attack their victims without ever having to be near them. Now that the internet and technology have become so advanced, it has become a large part of most people’s lives. Almost everyone you see or talk to has at least a…
What is the overlap between criminal justice and cybercrime?
There has become a large overlap in recent years between criminal justice and cybercrime. Cybercrime is a criminal activity that has any involvement with the internet or a device such as a computer. Criminal justice is the overall system that is used to convict a criminal of a crime so things such as laws and…
How do engineers make cyber networks safer?
Engineers do a lot to make cyber networks safer, involving multiple measures and techniques. Engineers are needed since they create and maintain cyber networks. While maintaining these systems the engineers look for ways to better the security of the network. Some ways they better the systems are by implementing encryption, access control, and firewalls. These…
Describe three ways that computers have made the world safer and less safe.
Computers have changed our lives forever. The thing is with computers is that they have changed our lives for both good and bad. One way that computers have made the world a safer place is by improving our communication with each other. When looking back people have been able to call each other for decades….