e-portfolio 4/22/2022

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? The “short arm” predictive knowledge applies to all aspects of law enforcement and criminology, as there’s no one sure way to be more efficient when responding to crime. In reality, it can take law enforcement several minutes, even…

e-portfolio entry 4/16/2022

How does cyber technology impact interactions between offenders and victims? I believe that cyber technology impacts interactions between offenders and victims in many different scenarios. The first scenario I can think of, and the most common interaction I see online is the interactions between survivors of sexual assault and either sexual abusers or abuser apologists….

e-Portfolio entry 4/10

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? I think there is a lot of overlap between criminal justice and cybercrime. Criminal justice is defined as the delivery of justice to those who have been accused of committing crimes. The basic…

ePortfolio #10

How do engineers make cyber networks safer? Part of engineers’ job is to help make cyber networks safer by creating stable, safe, and strong cyber networks in the first place. Along with this, it’s also their job to constantly update and improve on these networks to keep up with changing times and new vulnerabilities being…

E-Portfolio entry-2

Describe three ways that computers have made the world safer and less safe. Computers, the internet, and technology in general, all have its benefits and disadvantages when it comes to safety. Some of the advantages of computers is also the very thing that is a disadvantage. One advantage that comes to mind is how convenient…

Week 9 E-portfolio

There are many types if viruses and bugs in existence, that it may be difficult to tell if your computer is safe or not. Some viruses lurk quietly, without you knowing it’s there, whereas others are more obvious with their presence, showing up as pop-ups or making your computer act weird. Many computers come with…

e-Portfolio #7

What are the costs and benefits of developing cybersecurity programs in business? I think the benefits of developing strong and comprehensive cybersecurity programs in business highly outweigh the costs involved with the development and implementation of said programs. In a digital age, it is becoming more and more imperative to have a pre-established plan for…

E-Portfolio #6

How has cyber technology created opportunities for workplace deviance? I think that cyber technology created plenty of opportunities for workplace deviance. With the integration of technological devices in multiple types of industries, fields, and workplaces, it’s even easier than ever for employees to get away with what they want by not being face-to-face with another…

ePortfolio #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  For example: Create app that rates software.Yacht GPS software that is secureBeing an independent consultantEducate others in a cybersecurity classRate an industries or companies current level of securitySecurity auditingE-commerce securityCollect information on how to improve a security system (penetration testing)Unveil security issues…

E-Portfolio Entry #4

Compare cybersecurity risks in the U.S. and another country. I wanted to compare cybersecurity risks between the U.S. and Tajikistan. Cybersecurity in the U.S. was rated 31 out of all countries in terms of how cyber-safe they were (in a study done by Comparitech.com in 2021). The highest cyber-secure country was Denmark, with a score…