Module 3 Journal Entry – CYSE 201S

Cyber-attacks are continuously evolving, and it can be expected that the number of people potentially impacted is going to increase. The reason that resources like PrivacyRights.org are needed is because it allows us to see how millions of Americans will potentially be impacted. According to the information presented, data breaches caused by unknown sources creates…

Module 2 Journal Entry – CYSE 201S

Define each of the principals of science in your own words. Then, give an example of how each of the principals relates to cybersecurity. Analyze – Takes incoming intel and filters through it for information that is useful for intelligence. In the realm of cybersecurity, this is vital to make sure we don’t waste resources…

Post # 13

How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge? When developing a fact, is that a security and infrastructure policies is important to adapt for thinking, and adapted approach to remain resilient to further developing cyber threats. The first way that we can do this is by…

Post # 12

How does cyber technology impact interactions between offenders and victims? With the introduction of cyber technology into society, the landscape of interactions between offenders and victims was forever changed. Before this, most interactions were completed in person, such as stalking, bullying, and theft. With technology a whole new plethora of interactions have been created like…

Post # 11

The term criminal justice is described as a system of laws and agencies used to hold people accountable for the crimes and misdeeds that they commit. While the previous statement is true, the criminal justice system is far more intricate. The field of criminal justice consists of three sections: law enforcement, the court system, and…

Post # 10

How do engineers make networks safer? Engineers are key pieces in the success of companies due to the development and creation of cyber networks. They constantly work to make sure that the networks are constantly updated and protected from potential cyber threats. Some engineers work specifically on the development of cybersecurity programs to protect these…

Post # 9

3 ways computers have made the world more/less safe. The capabilities of technology have increased tremendously in recent years but this also has some drawbacks. Safer:Communication: There are new events that are unfolding every day, like terror attacks, natural disasters, etc. To stay on top of these events, it is important that we stay informed…

Post # 8

How can one tell that their computer is safe? Overall, there are many ways to tell if one’s computer is safe but the main way is to incorporate cybersecurity measures to protect your information. As, the technological landscape continues to change it is paramount to stay vigilant.

Post # 7

What are the cost and benefits of developing cybersecurity programs in business? Costs: When developing a business it is important to understand that the cyber landscape will continue to change as technology continues to develop. With this, the amount of cyber threats will undoubtedly increase. So, the costs spent developing a cybersecurity program is worth…

Post # 6

How has cyber technology created opportunities for workplace deviance? Since the creation of technology it has continued to advance at an exponential rate, and has lead us to the digital age that we are in now. Getting to this point has not been without without its challenges but experienced innovators have continued to learn and…