Journal #12

How does cyber technology impact interactions between offenders and victims? Often times victims will face some sort of cyber harassment or cyber stalking. It is so common these days that you should not even be surprised if it happens to you. These days, laws are being changed so that we can cover these sort of…

Journal 13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? I think that the best way to approach the development would be to try to update cyber policies as new technologies arise. I would recommend this because it is almost impossible to guess what new technologies will be…

Journal #10

1.  How do engineers make cyber networks safer? Engineers make cyber networks safer in a variety of different ways. One way is by helping to remove vulnerabilities when designing new systems. For example an article states, “While it is impossible to know all potential forms of adversity or to stop all anticipated disruptions, hazards, and threats,…

Journal #11

1. What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Criminal justice and cybercrime appear to overlap in many ways. For starters, cybercrime is a newer kind of crime that many people feel differently about. For example, an article explains how “some…

Journal #9

1. Describe three ways that computers have made the world safer and less safe. Computers have had a major impact on our society since they were first created. They have helped make our lives easier and more efficient. When we take a step back and look at computers from a security standpoint, we can see…

Journal #7

1. What are the costs and benefits of developing cybersecurity programs in business? There are many costs and benefits that businesses should take into account when deciding to develop cybersecurity programs. Looking over these different costs and benefits will help a business know what can happen if a cybersecurity program is implemented. I will begin by…

Journal #8

1.   How can you tell if your computer is safe? I would not necessarily say that you can ever one hundred percent know that your computer is necessarily safe; however, you can study up on cyber security and try to follow the best practices that are recommended. Doing nothing to protect your sensitive data could definitely…

Journal #6

How has cyber technology created opportunities for workplace deviance? Workplace deviance is when someone deliberately tries to harm a certain organization. This could be done employees, ex employees, or anyone around the organization at any given time. Workplace deviance can be very harmful and damaging since employees know how the organization operates and how to…

Journal #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  Create app that offers cybersecurity tipsYou can teach companies how using cyber frameworks will help themBetter a company by helping them understand riskEngineer ways to identify threats in systemsReconnaissance to ethically scout out a system to ensure securityStart a cloud computing…

Journal #4

 Compare cybersecurity risks in the U.S. and another country. Cybersecurity risks are not only prevalent in the United States. In almost all developed countries today there are different cybersecurity risks. China, one of the most powerful nations and a major competitor of the United States, is a country that also has many cyber risks. One…