After moving states to be with family, I decided to take a break from university to gain real-world experience in my field of study. I was originally studying to become a pharmacist, but I had begun losing faith with the uncertain path. I found that the closest way I can get some real experience behind…
Author: dharg002
How does cyber technology impact interactions between offenders and victims?
Cyber technology has greatly impacted interactions between the offenders and the victims of cyber attacks. Cyber crimes are similar to traditional crimes, but the ways the crimes are committed and the ability to avoid arrest have changed. Here are some ways in which cyber technology has impacted the interactions between offenders and victims: In summary,…
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
The overlap between criminal justice and cybercrime is undeniable as many of the processes between the two are relatively the same: The prevention of criminal activity, the investigation, court proceedings, and rehabilitation. Whether a crime has been committed online or in person, the offending persons must be brought to justice to ensure safety for the…
How has cyber technology created opportunities for workplace deviance?
In order to optimize labor and accessibility to the public, companies have incorporated specialized machinery and internet connected technologies into the workplace. However, with the incorporation of internet connected devices into big businesses, comes the common risks when using the internet. Misuse in the Workplace It is important to have regulations on how company staff…
Ethical issues that arise when storing electronic information about individuals.
In the field of Cybersecurity, not only is it important to understand the operations used by good guys and bad guys alike, but it is important to understand the risks everyone takes when keeping personal information on electronic devices. The most prominent issue we run into is the possibility of electronic information being stolen. Whether…
*Why are you interested in cybersecurity technology?
As a young man, I was always enthralled by the world of technology and what it could offer. I did not come from a tech savvy family, so it was up to me to understand the necessary components and configurations of anything relating to the internet in the house if I wanted the best out…
What areas that you would want to focus your career on?
When it comes to cybersecurity, I find data collection and analysis appealing. I naturally want to look into law enforcement and other investigative positions. Reviewing the NICE framework: Threat analysis looks appealing in that it focuses on the analysis of the capabilities of cyber threats and foreign intelligence. I often ask myself “What if” when…
How the principles of the Social sciences relate to Cybersecurity
There are numerous parallels between the disciplines of science and Cybersecurity. Cyberspace has offered a new landscape in which humanity conducts business and socialize; all from behind their computer screens. These great advances however require professional strategies to protect its users from cyber threats. How can we relate social science principles to cyberspace and the…
The Internet and our Needs
Over the years the internet has expanded into fulfilling many human needs. From ordering food, connecting with friends around the world to working from home, the internet offers an experience that allows individuals to experience the world from home. Although not an exact representation of the world, what exactly has the internet been fulfilling in…
How the media influences our understanding of cybersecurity
I appreciate the media, such as movies and television shows, for bringing the importance of securing our private data to the public view. The unfortunate side effect is that most of the time, processes and strategies are oversimplified to keep the story moving. It is only natural that directors would want to over-dramatize the maliciousness…