Journal #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? One of the most pressing issues we face today is cybersecurity. The development of cyber-policy and infrastructure is crucial to ensure the security of our data and prevent cyber attacks. However, this task is not easy, especially given…

Journal #12

How does cyber technology impact interactions between offenders and victims? Cyber technology is significantly changing how offenders and victims interact. The way we communicate using technology is evolving quickly, and with it, so are the new ways that predators can prey on others. Because they can interact with people from all over the world thanks…

Journal #11

What is the overlap between criminal justice and cybercrime? Due to the fact that cybercrime is becoming more and more common in our society, there is a significant overlap between criminal justice and it. The term “cybercrime” refers to crimes committed online or via other technological means, such as computers. Hacking, identity theft, fraud, cyber…

Journal #10

How do engineers make cyber networks safe? In the modern world, where cyber threats are becoming more sophisticated and common, cybersecurity engineers are crucial. The strategies used by cybercriminals to take advantage of security holes and steal sensitive data change as technology progresses implementing and maintaining security measures to ensure the safety and efficiency of…

Journal #9

Describe three ways that computers have made the world safer and less safe. Computers have made the world much safer in a number of ways. Cybersecurity is one way that computers make the world a safer place. Security teams can use computers to monitor and examine network traffic, identify potential threats, and take prompt action…

Journal #7

What are the costs and benefits of developing cybersecurity programs in business? In today’s digital age, cybersecurity is a crucial aspect of any business. With increasing cyber threats, businesses must take the necessary steps to protect their networks, data, and systems from potential attacks. Developing a cybersecurity program is one way to safeguard against these…

Journal #6

How has cyber technology created opportunities for workplace deviance? Cyber technology has a variety of behaviors in its arsenal to break down and expose organizations. Deviance is typically divided into two categories: interpersonal and organizational. Interpersonal deviance aims to degrade relationships through activities like dishonesty, slandering, and assigning blame. Organizational deviance includes behaviors like being…

Journal #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  Create app that rates software Yacht gps software that is secure Becoming a public speaker for cybersecurity Ethical hacking to break into companies software Review a organizations system software and determine weak points Sart your own Cyber business to…

Journal #4

 Compare cybersecurity risks in the U.S. and another country. Across the globe, the USA has the most active cybersecurity country. Americas companies and agencies are being degraded by less powerful nations because of workers not fighting back when being cyberattacked.However, America is still one of the most technically advanced countries in cyber due to military…

CYSE 200T Journal Entry #3

Describe four ethical issues that arise when storing electronic information about individuals. The four ethical issues when storing electronic information about individuals include privacy and confidentiality, security breaches, system implementation, and inaccurate data.  Storing data electronically will put organizations at an advantage when it comes to defending data.  Privacy and confidentiality will keep information about…