Journal entry 13

 When we think of the “short arm” of predictive knowledge. It’s important for us to remember that technology is constantly evolving which means the methods cybercriminals are taking are also ever evolving. So it’s very crucial for us to approach the development of cyber policy and infrastructure on a day to day bases. This idea itself shows us that we can’t always accurately foresee the future in the cyber world. Instead we should focus on...

Read More

Journal entry 12

In our world today cyber technology has significantly impacted the interactions between offenders and victims. This is because of the digital landscape we are actively part of the which effects the dynamics between offenders and victims, which and is due to cyber technology. In the past, crimes were often always committed in person. This instilled the fear of physical harm in the eyes and hearts of victims. For example, the traditional robbery...

Read More

Journal entry 11

Criminal justice is one of the social sciences which makes it highly overlap with cybercrime in various aspects. As many, social sciences are interconnected with cybercrime in various aspects. Criminal Justice is centered around studying criminals, law enforcement, and the legal system. In relation to cybercrime, the focus shifts towards developing legal deals, responding, and preventing cyber threats in the future. Sociology is another social...

Read More

Journal entry 10

Engineers are very crucial when it comes to making our cyber networks safer. They use many different methods to improve the safety and strength of our networks. They work hard to build newer and better cyber security networks that make it tough for unauthorized users to access them or break in. When an engineer is working on a network their main goal is to strengthen and protect the the internal aspects of the network. Engineers also have to...

Read More

Journal entry 9

Computers play a significant role in making our everyday lives safer and more convenient.  There are several ways computers have made the world safer and less safe. When it comes to emergencies computers have significantly improved our safety. Most if not all dispatch centers today use GPS technology so they can support and swiftly help those in need. This is a significant advancement from the past where providing aid depended on handwritten or...

Read More

Journal entry 8

There are many ways to ensure your computer’s safety. Ensuring your computer’s safety requires many different approaches that combine both built-in features and our habits. The first way to ensure our computer’s safety is to check if our firewall is enabled, as it shields our device from harmful traffic.  Most modern Windows systems come with it equipped.  With a firewall,  regular updates,  and anti-virus software like Windows Security or...

Read More

Journal entry 7

Developing a cybersecurity program in business has its costs and benefits, The first cost involved with incorporating a cybersecurity program in business is the significant funds required for the cybersecurity setup. Which involves paying specialists who can put in the right safeguards,  deep dives, and covers for any weak spots. When you are trying to develop a cybersecurity program in business you are going to spend cash and time training the...

Read More

Journal entry 6

Deviance is when someone’s actions don’t match the normal standards expected of them. This can be seen in when someone starts behaving different at work. In the world of cyber technology, bad behavior at work can slip by unnoticed more easily than in other areas because it’s often done online. Let’s say an employee isn’t happy because they were either let go or didn’t get something or get a promotion they thought they deserved. This person...

Read More

Journal entry 5

C – Consulting and evaluating for cybersecurity risk assessments and mitigation strategies. Y – Yielding profits through  legal hacking like testing a company’s security . B – Building and selling  protected messaging tools or encrypted apps . E – Establishing a web platform for cybersecurity training or teaching courses online. R – Running a blog or video blog about cybersecurity and earn from ads, sponsors, or affiliate links. S –...

Read More

Journal entry 4

  For this journal Entry, I was asked to compare cybersecurity risks in the U.S. and another country. I chose to evaluate Germany by comparing our infrastructures, regulations, cybercrime rates, and technological advancements. This has helped me compare the cybersecurity risks in the U.S. and Germany comparing these things. The US has a wide range of complex and digital infrastructures due to our large economy and extensive internet usage...

Read More