Journal #13

The implementation and development of cyber-related policies and cyberinfrastructure present a unique problem given the often short sighted nature of humanity’s predictive knowledge capabilities. We can not just look at the immediate splash of new technological advancements, instead, we must consider the ripple effects that will come after. Today we have great potential to change…

Journal #12

The advances made in cyber technology have been nothing short of revolutionary, though it is not without its dark side. An example of this is the way it impacted the interactions between offenders and victims of cybercrimes. For example, there are the cybercrimes of cyberstalking and cyber harassment. Unfortunately, these are two very serious situations,…

Journal #11

Criminal justice is the study of crime, and cybercrime is a specific area of focus within criminal justice. This focus has been given the term cybercriminology. Criminal justice looks for ways to detect and handle criminal acts, how crimes should be punished judicially, and if the crimes can be prevented if possible. Cybercriminology is the…

Journal #10

System engineers lie at the very heart of the complex problem of managing large-scale operations. A well put together and maintained system is essential for key industries to operate safely, efficiently, and with reduced errors. Ultimately, a system engineer protects the assets of a network through the “engineering of security functions; addressing the security aspects…

Journal #9

Computers have completely changed nearly every facets of our lives. Though with such revolutionary changes comes both positive and negative impacts. In some ways computers have made the world a much safer place, but on the other hand there are ways such technology have made the world less safe. One way that computers have made…

Journal #8

Knowing that your computer safe is a multistage process. It involves taking preventive measures, checking that your defenses are in proper order, and being able to recognize and handle any security problems that do arise. There are multitude of ways to keep the security of your daily devices from being compromised. One of the easiest…

Journal #7

Every business has a unique cybersecurity situation. For this reason, there truly is no simple one size fits all approach for protecting a business’s assets. Developing a cybersecurity plan in the workplace is a balancing act between budget and situation specific risks. The two factors of cyberattack risk and budgetary constraints are what will determine…

Journal #6

In an article from the Journal of Management Information Systems the research team defines cyber-deviance as the “use of IT in the workplace that is contrary to the explicit and implicit norms of the organization, and that threatens the well-being of the organization and/or its members” (Venkatraman et al.). A more boiled down version of…

Journal #5

Legal ways to make money in cybersecurity: Code an intrusion detection system software YouTube channel on technology w/ ad revenue & sponsors Build an app for tracking companies that have suffered breaches Engineer computer hardware Ransomware recovery services Start a cybersecurity firm Entry level job in cybersecurity field Create an online cybersecurity course Use cyber…

Journal #4

The United States and the Kingdom of Denmark are two very seemingly different nations. The United States has a much larger population, larger land mass, and carry two completely different geopolitical roles. One area in which they do have something in common is that, depending on the source and metrics used, the two are often…