Journal #13

How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge? The thing about cybercrime is that we will never know what the next thing will be or what comes next. It is a fact that is definitely daunting, but not hopeless for us. I believe that our approach…

Journal #12

How does cyber technology impact interactions between offenders and victims? To start, crime has simply changed over the years. It used to be physical and face to face. It could be robbing a bank, stealing a car, or physical assault. This is the type of crime that leaves victims fearful and with post-traumatic stress. With…

Journal #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Cybercrime is still a relatively new crime compared to others. It obviously was not around before computers and the Internet came to be. Even in our movies, we see cybercrime interpreted as heisting…

Journal #10

How do engineers make cyber networks safer? Cyber networks have become an important part of our lives today. In the United States, there are millions of people that could be using them at any moment in time. You can use a cyber network for just about anything too. You can store private information, communicate via…

Journal #9

Describe three ways that computers have made the world safer and less safe. Like everything in the world, there is a yin and a yang, a balance. You can’t have good without the bad. Well computers adhere to this code as well, even if they aren’t actual living beings. Computers have allowed us to reach…

Journal #8

How can you tell if your computer is safe? I believe that being questionable about whether your computer is safe or not is a popular feeling in the world today. That’s because your computer can be attacked from so many different angles nowadays, it is almost like simply opening an email can turn your laptop…

Journal #7

What are the costs and benefits of developing cybersecurity programs in business? Developing cybersecurity programs is an important concept that all businesses should take into consideration if they haven’t already. That is because cybersecurity itself has become such a prominent field as of late. In today’s world, cybersecurity protects everything that we deem important in…

Journal #6

How has cyber technology created opportunities for workplace deviance? Through some way or another, we have all heard a story about somebody “sticking it to the man” at work, but you can also call it workplace deviance. Deviance itself means departing from the accepted standards, especially in a societal or sexual behavior. So, as I’m…

Journal #5

Use the letters of the word cybersecurity to list legal ways to make money in cybersecurity. Create apps that rate software. Yacht GPS software that is secure. Become a penetration tester. Erase data permanently for businesses. Respond to data breaches or cyber-attacks. Security engineer Encrypt data, emails, etc… Create an email encryption for a business’…

Journal #4

Compare cybersecurity risks in the U.S. and another country. In the United States, there are several different cybersecurity risks that keep security professionals on their toes twenty-four hours a day, seven days a week. The top cybersecurity risks in my opinion include several attacks on our country’s critical infrastructure like our electric grids, attacks on…