Journal # 13

There are a few ways to approach the development of cyber-policy and infrastructure planning even with the ability of predictive knowledge being minimal. One main thins to focus on or approach is the technology level. With so many businesses and organizations so deeply rooted and invested in technology, it is important to know and use…

Journal # 12

The interaction between offenders and victims throughout any cyber crime has changed over time as technology and the advancement of crimes has changed. for ONE, it makes it significantly difficult to track down the offenders because due to the advancement in crimes and technology, the offender can be located anywhere throughout the world and the…

Journal #11

I believe there are a couple areas in which criminal justice and cybercrime do overlap. Criminal justice put simply is the system of enforcing and apprehending any criminals and cybercrime is essentially illegal acts carried out by criminals but just through the means of technology and cyberspace. In both areas, technological advancements play a huge…

Journal # 10

Engineers deal with technology everyday and help to setup and program different hardware and software for a variety of networks. They are able to help within cybernetworks to ensure and increased level of safety and security in a variety of ways. One main way would be with penetration testing and network assessments. These tests truly…

Journal #9

Since computers have become more and more prevalent in our society and most companies, they have brought both benefits and drawbacks to safety.  One definite drawback to computers is that most sites and devices can require a password to access and it is so convenient to set the same passwords for most if not all…

Journal #8

There are many different ways to help identify how safe your computer is. There is no way to completely make your risk zero, but you can do quite a bit to ensure your computer is safe from most issues and attacks. One thing you should always do is back up your data. Whether you are…

Journal #7

When developing a cybersecurity program within a business, you have to consider both the benefits but also the cost of the program as well. The obvious benefits for the cybersecurity program being developed for any business would be that the systems and networks that any business must use would be protected efficiently and would prevent…

Journal #6

Due to the ever-advancing field of technology, the ability to cause a disturbance in the workplace or even cause damage to the workplaces network or infrastructure has also expanded. With faster computer, smart phones, and various other devices that companies may use, there is a big dependency on technology, which disgruntled employees can fully take…

Journal #5

Legal ways to make money in Cybersecurity Cryptographer Yogurt company’s security architect for their warehouses Block chain developer/engineer Ethical hacker for the government Red Hat cloud infrastructure architect Security software engineer Engineer or architect of a large corporations entire network Chief Information Security Officer (CISO) for a government organization or large corporation Unix/ Linux systems…

Journal #4

Two of the countries with the highest rates of cybercrimes and attacks are China and the United States. The reason both countries are two of the highest in most categories of cybercrime and attacks is that the technological advancement in these countries is ever expanding along with the increase of population. As their populations grow,…