E-Portfolio Entry #7

1. How does cyber technology impact interactions between offenders and victims? 2. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? The influence of cyber technology on offender-victim dynamics extends beyond the mere introduction of new criminal avenues. The digital realm not only provides anonymity for offenders…

E-Portfolio Entry #6

1. How do engineers make cyber networks safer? 2. What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Engineers play a crucial role in enhancing the safety of cyber networks through a complex approach. Encryption technologies are essential components that engineers implement to…

E-Portfolio Entry #5

1.  How can you tell if your computer is safe? 2. Describe three ways that computers have made the world safer and less safe. To determine if your computer is safe, several key practices should be applied. Firstly, the presence of reputable security software is vital. Using an unknown or not well-known security software could do the…

E-Portfolio Entry #4

What are the costs and benefits of developing cybersecurity programs in business? Developing a cybersecurity program in businesses involves considerable financial commitments. These may include investments in technology infrastructure, personnel training, and regular updates to counter evolving threats. The allocation of dedicated resources, such as hiring skilled professionals, can divert significant resources from other business…

E-Portfolio Entry #3

How has cyber technology created opportunities for workplace deviance? Cyber technology created many opportunities for workplace deviance, some examples of this are distraction, online criticism, cyber-attacks, and data theft. The rise of personal devices in the workplace has led to increased cases of distraction. Employees and employers may use smartphones, tablets, or personal computers for…

E-Portfolio Entry #2

1. Describe four ethical issues that arise when storing electronic information about individuals. 2. Compare cybersecurity risks in the U.S. and another country. One ethical issue is data breaches, they pose a significant threat to individual privacy with identity theft being a primary concern. In the event of a breach, sensitive personal information such as…

E-Portfolio Entry #1

Cybersecurity technology is an interesting field and although it is not my focus at ODU, it will still be good to know about it, especially at a time when technology is growing at an explosive rate. As technology grows, humans gain more opportunities or abilities to perform new things or accomplish new things that have…