Edmund Reisser

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?

Researchers can use public data gathered by Data Breaches to prevent not only future attacks but to also use this same information to...

Read More

Explain how the principles of science relate to cybersecurity

Cybersecurity is a type of applied science, so the different principles of science will already apply. Cybersecurity is considered a...

Read More

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

The area’s that appeal to me the most in the NICE Framework are Analyze and Oversee/Govern. The reason that these two appeals to me...

Read More

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? The fact of the...

Read More

How does cyber technology impact interactions between offenders and victims?

How does cyber technology impact interactions between offenders and victims? With the popularity increasing for the internet usage, the...

Read More

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this...

Read More

How do engineers make cyber networks safer?

How do engineers make cyber networks safer? A Cyber Security Engineer creates computer security procedures and software systems, by doing...

Read More

How can you tell if your computer is safe?

How can you tell if your computer is safe? In the digital age, it is easy to believe that your computer may be secure from influences and...

Read More

What are the costs and benefits of developing cybersecurity programs in business?

Cybersecurity is arguably one of the most important aspects a business could invest in. The benefits definitely outweigh the costs in the...

Read More

How has cyber technology created opportunities for workplace deviance?

Deviance is defined as “the fact or state of departing from usual or accepted standards, especially in social or sexual behavior.” With...

Read More