To begin a discussion of cyber-policy and infrastructure given the “short arm” of predictive knowledge; we must first define predictive knowledge and the “short arm of”. “Predictive knowledge is a group of approaches to machine perception and knowledgeability using large collections of predictions made online in real-time through interactions with the environment. (Evaluating Predictive Knowledge) Short…
ePortfolio entry #12
Moore’s can tell us a lot about where we have come from in terms of technology advancements. In a nutshell Moore’s law states that technology doubles almost every two years. Technology is intertwined into almost every facet of our everyday lives. These advancements have also impacted interactions between offenders and victims. “By 2025, 38.6 billion…
ePorfolio entry #11
The main overlap between criminal justice and cybercrime is technology. With technology comes cybersecurity; cybersecurity be definition is an interdisciplinary approach to solving security issues faced in the modern world. Cybersecurity aims to protect and resolve incidents, threats, and actual crimes through this multidisciplinary approach. Criminal justice as a discipline also try to accomplish these…
ePortfolio entry #10
Engineers make up a huge part of cyber networks being safer. The ways in which this momentous task is accomplished is through a team strategy and breaking down the whole into manageable parts which are best suited for individual strengths. Engineering a more secure software solution vital if we are going to create a safer…
ePortfolio entry #9
Since the first IDS system was researched and developed by Dorothy Denning and Peter Neumann between 1984 and 1986 (Bruneau) computers have made the world safer. IDS systems are knowledge based, network based, and/or host based. This system has become an essential tool for computer safety. Firewalls first emerged in 1988 and have three generations of…
ePortfolio entry #8
According to Carrie Anne of Crash Course; “… there’s no such thing as a perfectly 100% secure computer system.” (https://youtu.be/jhXCTbFnK8o) Safety should be at the forefront of every person’s mind. Unfortunately, today, most people take for granted the computer and turn it on and go without a second thought to security/safety. In the chef world,…
ePortfolio entry #7
A cyber security program includes two main costs. The costs associated with the actual implementation monetarily speaking and the cost of not implementing a cybersecurity program. We will focus on the later because the monetary cost of not implementing vs. implementing vastly exceeds the implementation. Costs of not having a program in place include loss…
ePortfolio entry #6
ePortfolio entry #6 Technology has infiltrated every aspect of everyday life and the repercussions have yet to be seen. Workplace deviance is now become more of an issue in terms of cyber technologies. Research shows that 81% of Americans now own a smartphone. (Pew Research Center) Screeneducation.org conducted a survey that shows employees spend 2.4…
ePortfolio #5
Using the word Cybersecurity, here is a list of legal ways to make money in cybersecurity Create an app that utilizes a particular framework to determine if a network is secure Yearn for knowledge and never stop learning Build a navigable interactive web solution for the different frameworks Experience, Experience, Experience Run bug bounties Sell…
ePortfolio #4
United States vs. Japan – Cybersecurity risks The United States has the Cybersecurity & Infrastructure Security Agency while Japan has the National center of Incident readiness and strategy For Cybersecurity. Looking at both agencies websites, the United States has a stronger hold on Cybersecurity. The government’s ability to aid its citizens in the reduction of…