Journal Entry 13: How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge?

In cybersecurity, companies and organizations will not always know what is coming their way. To elaborate, cyber-attacks are spontaneous and can not be anticipated lightly. Companies/organizations must prioritize implementing a strong and secure cyber policy, as well as their infrastructure to be prepared for any potential threats. The consequences associated with not having anything set…

Journal Entry 11: What is the overlap between criminal justice and cybercrime? How does this overlap relate to other disciplines discussed in this class?

There are many instances of these two fields overlapping in this industry. Due to the many similarities between the two, they frequently intersect. The word, or another form of it, crime, is the first similarity that may be recognized. Criminal justice is a science that focuses on law enforcement, courts, and disciplinary measures. Cybercrime refers…

Journal Entry 10: How do engineers make cyber networks safer?

A Cyber Security Engineer is responsible for developing computer security policies and software systems. These security policies and software systems are designed to protect the company’s network and projects efficiently. This is important for all companies and organizations given the magnitude of the field. Engineers in cyberspace perform many tasks that make cyber networks safer,…

Journal Entry 8: How can you tell if your computer is safe?

To avoid cyber-attacks and protect your personal information, you must keep your computer secure. After purchase, many people assume that computers are automatically safe and ready for use, however, this is not always the case. There are many processes to determine whether your computer is safe or not. Installing an anti-virus software that is up…

Journal Entry 5: Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.

C – Consultant:  Consultants give advice or services in an area of specialization. In this case, a consultant will help companies/organizations improve their cybersecurity practices and techniques. Y – YouTube Channel – Individuals involved in the cybersecurity industry can profit from creating a YouTube channel and establishing a substantial following. A lot can be learned…

Journal Entry 3: Describe four ethical issues that arise when storing electronic information about individuals.

Since there are numerous aspects of the cybersecurity industry, including both advantages and disadvantages, it is an immensely vast field. Those involved in the field will not always agree on the ethical concepts concerning cybersecurity, however, they can all agree on four ethical issues that arise with storing electronic information about people. These four ethical issues…

Journal Entry 1: Why Are You Interested in Cybersecurity Technology?

Growing up, I have always been fond of technology. One of my longest-tenured hobbies is playing video games, either on a console or PC, which involves the understanding and application of various technologies. For some reason, the ability to comprehend and solve issues regarding technology came easily to me, as I was usually the person…