{"id":288,"date":"2022-12-12T15:08:56","date_gmt":"2022-12-12T15:08:56","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/?p=288"},"modified":"2022-12-12T15:08:59","modified_gmt":"2022-12-12T15:08:59","slug":"eportfolio-entry-6","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2022\/12\/12\/eportfolio-entry-6\/","title":{"rendered":"ePortfolio entry #6"},"content":{"rendered":"\n<p><strong>1.&nbsp;How do engineers make cyber networks safer?<\/strong><\/p>\n\n\n\n<p><strong>2. What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?<\/strong><\/p>\n\n\n\n<p>A Cyber Security Engineer creates computer security procedures and software systems. They tailor these intrusion detection and prevention tools to their company. One of their main responsibilities is to handle tech issues for all computer security matters. They must have exceptional incident response skills. Security Engineers also need a high level of computer forensics competence. They work with other engineers and IT to keep company computer systems efficient. So, Cyber Security Engineers need strong communication skills. These Analysts are crucial because Info Sec Managers and Admins need them. If a breach hits a company, the engineer might adjust the software to prevent it happening again.&nbsp;&nbsp;Cybersecurity engineers protect organizations from serious cyber threats and attacks. They perform assessments and penetration testing. Develop and implement secure network solutions. Architect and engineer trusted systems in secure systems. Manage audit\/intrusion and security technology systems. With increases in technology and the fact that the world is becoming much more reliant on computers and the internet, there has been a rise in a new type of crime known as cybercrime. Cybercrime can also be associated with electronic crime. This type of crime encompasses many different types of illegal actions, but all cybercrime uses a computer, network, or the internet to do illegal activities. The overlap between criminal justice and cybercrime is that criminal justice has to do with illegal actions in the real world and cyber crime deals with illegal actions online.&nbsp;&nbsp;This relates to other disciplines discussed in this class because just as in criminal justice they are finding ways mitigate crime and risks is the same in cybercrime, investigations are done in order to find ways to mitigate threats and attacks. Another would be framework or like an outline criminal justice follow certain outlines to make policies and the same is done for cybercrime.<\/p>\n\n\n\n<p><a href=\"https:\/\/hbu.edu\/science-and-engineering\/degree-programs\/ug-major-cyber-engineering-bs\/what-does-a-cyber-security-engineer-do\/\">https:\/\/hbu.edu\/science-and-engineering\/degree-programs\/ug-major-cyber-engineering-bs\/what-does-a-cyber-security-engineer-do\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/cyber-security.degree\/cyber-security-career\/cyber-security-engineer\/\">https:\/\/cyber-security.degree\/cyber-security-career\/cyber-security-engineer\/<\/a><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-criminal-justice-degree-hub wp-block-embed-criminal-justice-degree-hub\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"BpnGfmVgzl\"><a href=\"https:\/\/www.criminaljusticedegreehub.com\/what-is-cybercrime\/\">What is Cybercrime?<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;What is Cybercrime?&#8221; &#8212; Criminal Justice Degree Hub\" src=\"https:\/\/www.criminaljusticedegreehub.com\/what-is-cybercrime\/embed\/#?secret=BpnGfmVgzl\" data-secret=\"BpnGfmVgzl\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-criminal-justice-degree-hub wp-block-embed-criminal-justice-degree-hub\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"BpnGfmVgzl\"><a href=\"https:\/\/www.criminaljusticedegreehub.com\/what-is-cybercrime\/\">What is Cybercrime?<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;What is Cybercrime?&#8221; &#8212; Criminal Justice Degree Hub\" src=\"https:\/\/www.criminaljusticedegreehub.com\/what-is-cybercrime\/embed\/#?secret=BpnGfmVgzl\" data-secret=\"BpnGfmVgzl\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-criminal-justice-degree-hub wp-block-embed-criminal-justice-degree-hub\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"BpnGfmVgzl\"><a href=\"https:\/\/www.criminaljusticedegreehub.com\/what-is-cybercrime\/\">What is Cybercrime?<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;What is Cybercrime?&#8221; &#8212; Criminal Justice Degree Hub\" src=\"https:\/\/www.criminaljusticedegreehub.com\/what-is-cybercrime\/embed\/#?secret=BpnGfmVgzl\" data-secret=\"BpnGfmVgzl\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>1.&nbsp;How do engineers make cyber networks safer? 2. What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? A Cyber Security Engineer creates computer security procedures and software systems. They tailor these intrusion detection and prevention tools to their company. One of their&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2022\/12\/12\/eportfolio-entry-6\/\">Read More<\/a><\/div>\n","protected":false},"author":25260,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/288"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/users\/25260"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/comments?post=288"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/288\/revisions"}],"predecessor-version":[{"id":289,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/288\/revisions\/289"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/media?parent=288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/categories?post=288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/tags?post=288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}