In cybersecurity, companies and organizations will not always know what is coming their way. To elaborate, cyber-attacks are spontaneous and can not be anticipated lightly. Companies/organizations must prioritize implementing a strong and secure cyber policy, as well as their infrastructure to be prepared for any potential threats. The consequences associated with not having anything set…
Category: CYSE 200T
Journal Entry 12: How does cyber technology impact interactions between offenders and victims?
Cyber technology has the potential to greatly impact interactions between offenders and victims. Online communication is one of the most apparent ways that cyber technology influences these interactions. Offenders can engage with their victims using many online platforms such as social media and games, without disclosing their true identity. Advances in technology have made instant…
Journal Entry 11: What is the overlap between criminal justice and cybercrime? How does this overlap relate to other disciplines discussed in this class?
There are many instances of these two fields overlapping in this industry. Due to the many similarities between the two, they frequently intersect. The word, or another form of it, crime, is the first similarity that may be recognized. Criminal justice is a science that focuses on law enforcement, courts, and disciplinary measures. Cybercrime refers…
Journal Entry 10: How do engineers make cyber networks safer?
A Cyber Security Engineer is responsible for developing computer security policies and software systems. These security policies and software systems are designed to protect the company’s network and projects efficiently. This is important for all companies and organizations given the magnitude of the field. Engineers in cyberspace perform many tasks that make cyber networks safer,…
Journal Entry 9: Describe three ways that computers have made the world safer and less safe.
Computers and technology have had both beneficial and harmful effects on everyday life. There is no question that technology has advanced human society more than we have known and provided us with limitless potential for what we can achieve. However, all the good that comes with technology is also met with negatives. As technology develops…
Journal Entry 8: How can you tell if your computer is safe?
To avoid cyber-attacks and protect your personal information, you must keep your computer secure. After purchase, many people assume that computers are automatically safe and ready for use, however, this is not always the case. There are many processes to determine whether your computer is safe or not. Installing an anti-virus software that is up…
Journal Entry 7: What are the costs and benefits of developing cybersecurity programs in business?
Implementing cybersecurity programs into a business can be beneficial, but at the same time, can come with many costs depending on the programs that are required. Costs:· Constant Maintenance (Updates): In this industry, cybersecurity programs will require updates due to the exponential advancement of technology today. There are new methods and strategies specifically created for…
Journal Entry 6: How has cyber technology created opportunities for workplace deviance?
Workplace deviance can be defined as behavior that is inconsistent with corporate standards and expectations and can be both damaging and harmful to the organization and its employees. Employees are more likely to participate in deviant behavior due to advancements in cyber technology. Cyberbullying is an example of how cyber technology has led to workplace…
Journal Entry 5: Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.
C – Consultant: Consultants give advice or services in an area of specialization. In this case, a consultant will help companies/organizations improve their cybersecurity practices and techniques. Y – YouTube Channel – Individuals involved in the cybersecurity industry can profit from creating a YouTube channel and establishing a substantial following. A lot can be learned…
Journal Entry 4: Compare cybersecurity risks in the U.S. and another country.
Being that the United States is one of the most technologically advanced nations in the world, it is common that they will frequently experience cyber attacks by other nations. Due to their political and economic dominance, there is a lot of sensitive information that must be protected and secured daily. Many countries will want to…
Journal Entry 3: Describe four ethical issues that arise when storing electronic information about individuals.
Since there are numerous aspects of the cybersecurity industry, including both advantages and disadvantages, it is an immensely vast field. Those involved in the field will not always agree on the ethical concepts concerning cybersecurity, however, they can all agree on four ethical issues that arise with storing electronic information about people. These four ethical issues…
Journal Entry 1: Why Are You Interested in Cybersecurity Technology?
Growing up, I have always been fond of technology. One of my longest-tenured hobbies is playing video games, either on a console or PC, which involves the understanding and application of various technologies. For some reason, the ability to comprehend and solve issues regarding technology came easily to me, as I was usually the person…