In criminology, a crime is a violation of a law that is unjust and can be sanctioned by the state as a felony and misdemeanor. In the world of cybercrime, it would be the same concept in that the crime is a violation of a law in the cyber world of committing an act of…
Author: hpicc001
JE: 10
Engineers make cyber networks safer in multiple ways. Engineers come up with new technologies with built in safety options to prevent attacks, hackings, and break ins on any and all persona data to an individual, company, business or corporation. These could be certain brands themselves or coming up with softwares and ideas such as two…
JE: 9
3 ways computers have made the world safer: it provides a new space to put all of your personal information in one place where it is not a physical form of anything that can be stolen. It also provides safer ways for messages to be sent and received without anyone else knowing. Another way computers…
JE: 8
The best way to ensure that your computer is safe is by doing the basics that everyone should learn about/know. Your computer should always have a password in order to open and access it. If there is an option it is always best to set up a double authentication system to ensure that it is…
JE: 7
The costs of developing cybersecurity in a business can depend on how big the business is and how much they are willing to and or can afford for certain cybersecurity protection. High technology cybersecurity definitely isn’t going to be affordable for all but it will provide the most benefit. The benefit of cybersecurity in a…
JE 6:
Ironically, as cybersecurity is meant to protect and keep things safe, it is very easy for opportunities in workplace deviance. One way is by your own workers. Whatever the circumstance may be, no matter how much trust a person may gain from their employer, it would be very easy for someone of an extremely trusted…
JE 5:
Using the word “Cybersecurity” as a way to make money! CybersecurityYacht GPS software that is secureBackups for any softwareEncryption keysRouters that are safe for your homeSecure networkingElectronic transferable dataCarefully choosing passwordsUsb’sRenovating safety plans for cyber breachesInternet VPN’sRenewing technology to be more safeTechnology that can encrypt personal dataYouthful minds helping to find ways to secure technology
JE 4:
There are very few countries that are at extremely high risk for cyber security attacks. Those countries being the U.S, Russia, and China. Some examples of big cyber attacks in the U.S are: social engineering, third-party exposer, configuration mistakes, cloud vulnerabilities, mobile device vulnerabilities, malware, phishing, and ransomeware. along with much more. However, in Russia,…
JE 3:
4 Ethical issues that arise when storing electronic information about individuals: Security- Most of peoples person information can be found or leaked very easily across the internet. This issue would be the most obvious and most privacy can be invaded. Confidentiality- Leads off of security. Except confidentiality is going to be codependent of security. The…
JE 2:
Four college majors that can apply to cyber security are: Engineering, of course there are various types of engineering but any engineering specific to computers, or government/military related can definitely apply to cyber security. Another is Business, which in any business there is of course going to be data and private information you are going…