Journal #6

How do engineers make cyber networks safer?

In 2018 1,244 successful data breaches were reported and 446.52 million records were exposed as a result causing businesses to lose 7.91 million dollars. Did these companies have an experienced engineer on staff? Most likely not. 

There are many different types of engineers that work on computers/computer systems and make them safer: cyber security engineers, network security engineers, and system security engineers. They all roughly do the same thing: create security procedures and systems that prevent intrusion and utilize tools to make systems secure and more functional. In other words- they make stuff secure and hard to reach. 

Depending on the organization an engineer can utilize things such as Virtual Private Networks, patch management, firewalls, Intrusion detection systems, Intrusion prevention systems, and even alerts to keep a system safe. 

Refs:

https:// (www) .aureon.com/network/security/why-your-business-needs-experienced-network-engineers/

(https) ://hc.edu/science-and-engineering/degree-programs/ug-major-cyber-engineering-bs/what-does-a-cyber-security-engineer-do/

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

The overlap between criminal justice and cybercrime is a prominent one. Criminal justice refers to the laws, procedures, institutions, and policies at play before, during, and after the commission of a crime. Cyber crime is criminal activity that either targets or uses a computer, a computer network or a networked device in its commissioning. 

Due to advancement in technology, criminals no longer need to physically put a gun to a victim and rob them. They can effectively do the same thing from behind their computer across the country, just with a couple clicks of a mouse. Now they’ve stolen someone’s identity and drained their bank account. A cyber crime has been committed, now what can a victim do to get justice? That’s where criminal justice comes in. The police use digital forensics to collect proof and eventually charge a suspect with a cybercrime. 

Refs:

https:// (www) law.cornell.edu/wex/criminal_justice

(https) ://usa.kaspersky.com/resource-center/threats/what-is-cybercrime

Leave a Reply

Your email address will not be published. Required fields are marked *