Journal Entry #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? The unknown can be a scary thought to many. Fear of what our actions can cause down the road could also hinder our ability to take the leap to further develop ourselves or technology. When discussing the approach,…

Journal Entry #12

How does cyber technology impact interactions between offenders and victims? Technology is both helpful and destructive depending on how it’s being utilized. For example, most people choose to use technology to browse the internet, complete schoolwork, play video games, or just do work. While this may seem innocent, the world we live in is not…

Journal Entry #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Cybercrime relates to criminal justice in many ways. As we learned early on, cybersecurity is interdisciplinary and relates to many different disciplines. Cybercrime relates to criminal and/or deviant acts that utilize technology to…

Journal Entry #10

How do engineers make cyber networks safer? Engineers are at the foreground of system security for organizations. The system security engineering framework is a core example of how engineers are behind a lot of the confidence that organizations have in ensuring their information is secured. Like any framework implemented in an organization, it is best…

Journal Entry #9

Describe three ways that computers have made the world safer and less safe. Technology and computers have had a great impact on society as a whole. We are able to do so much more and explore topics in a few clicks of our mouse that once would’ve taken swimming through a library to find the…

Journal Entry #8

How can you tell if your computer is safe? Ensuring your computer is safe is a fundamental, yet vital part of being confident in your system security. While there are multiple ways to ensure your computers safety, I will talk you through a couple of actions I would take personally to make sure that I…

Journal Entry #7

What are the costs and benefits of developing cybersecurity programs in business? The costs for developing a cybersecurity program varies between business models and what information security they are choosing to protect. Business size also plays a role in the costs of developing a cybersecurity program because depending on the size of your business, you…

Journal Entry #6

How has cyber technology created opportunities for workplace deviance? Cyber security is a necessity in all businesses and should be implemented from the very start. With cyber security measures in place, companies can be more at peace knowing that they are less likely to fall victim to cyber-attacks. However, what if the attacks are coming…

Journal Entry #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity:  C onsulate businesses in cyber security Y outube channel educating individuals/students on cyber security.  B ecome an ethical hacker. E arn money as a cyber security analyst. R ecruit a team of developers and develop secured websites for companies. S ecure organizations data as…

Journal Entry #4

Compare cybersecurity risks in the United States and another country: The United States is a country that has a high level of internet users and infrastructure. The U.S ranks high with other countries such as China in connectivity. Due to the high number of internet users, we are susceptible to more sophisticate attacks as we…