We should approach the development of cyber-policy and infrastructure given predictive knowledge by using that knowledge to it’s fullest. For example, if we know there is going to be an attack or that there is a vulnerable area, we need to close that area before something bad happens. We should approach cyber-policy in a way…
Journal Entry #12
Cyber technology impacts interactions between offenders and victims on the way the crimes are committed. Cyber technology gives us new crimes, sometimes the victim doesn’t know who the offender is, thus making it harder for law enforcement or detectives to find a suspect quickly. This can include things like fraud or identity theft. The…
Journal Entry #11
The overlap between criminal justice and cybercrime is that they both deal with enforcement of laws and maintaining order. In criminal justice, law enforcement officers enforce a wide range of rules and laws in society from performing traffic stops to dealing with domestic disputes where there might have been physical abuse or any type of…
Journal Entry #10
Engineers make cyber networks safer by considering past and possible future cyber-attacks that could crumble infrastructure or a business. Engineers consider past attacks because that puts a spotlight on any vulnerabilities that exist. Although an attack similar to that may not happen because there will always be something that is unexpected, an attack is…
Journal Entry #9
One way that computers have made the world safer is providing extra protection from attacks abroad. We can use these systems to detect any kind of attack that our adversaries may try to engage with us in. Another way that computers have made the world safer is the technology in automobiles, some computer systems will…
Journal Entry #8
You can tell if your computer is safe by a number of different things. One of them is if the computer is using cryptography to send a receive messages. You can tell if your computer is using this by seeing the little lock at the top of the browser where the URL is. Cryptography…
Journal Entry #7
The costs of developing a cybersecurity program can vary on the type of business that a person may have. One general cost is for detection, this is typically like software to detect any type of intrusion or entry where someone doesn’t have access. Another cost is the investigative cost, a business would hire people to…
Journal Entry #6
Cybersecurity has created opportunities for workplace deviance in a number of different ways. For example, new technology has allowed workers to communicate with each other at work or at home. If a coworker doesn’t like another coworker, they may do things to try to intimidate them or bully them, that could cause problems in…
Journal Entry #5
C – Combat cyber attacks Y – Youthinize the older generation in to adapting to new technology B – Back up critical files E – Establish new programs or ideas R – Record people stealing S – Store personal information E – Enter server data C – Connect with employees on cybersecurity U – Unify…
Journal Entry #4
The United States and other countries face roughly the same cybersecurity threats, although there are some differences. The United States must protect itself from phishing attacks, the United States accounts for 60% of the world’s attacks. Phishing attacks are trying to get someone to fall for something that is made up, for example like…