The phrase “short arm of predictive knowledge” refers to the limited understanding we have of current cybersecurity policies and infrastructures. I believe it suggests that even though we have some interpretation as to what the future holds, our ability to predict how it will turn out would not be as accurate. According to an article…
Journal #12
Cyber technology is always evolving and has forever changed how people interact online. Because of the advancements, the influence of cybercrime has also been affected and the interactions between offenders and victims has been impacted as well. Before the world of computers and digital communication, every crime was committed physically; criminals had to be physically…
Journal #11
Criminal justice and cybercrime are closely related because they both have something to do with the law, crime, and punishment. In the context of this discussion, it takes place specifically in the digital world. Criminal justice systems are responsible for maintaining the law and catching criminals. Cybercrime is an illegal activity that takes place on…
Journal #10
According to an article about system security that was published by NIST, “systems engineering provides the foundation for a disciplined and structured approach to engineering trustworthy secure systems”. This means that cyber networks would be safer when it is done by qualified system engineers. “Trustworthy”, in this instance, would also mean better security, more reliability,…
Journal #9
Computers, or technology in general, has transformed the world. It completely changed many aspects of how we do things as humans. Of the many benefits it has provided, safety is a controversial topic. Many people argue that computers have made the world a safer place in many ways that outweigh the dangers. For example, computers…
Journal #8
To tell if your computer is secure, there are a series of safety measures to check in order ensure it is safe. The first thing is to install a firewall. According to Cisco, “a firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific…
Journal #7
Developing cybsersecurity programs in business has both its costs and benefits. On the downside, there is a lot of money that would be invested in order to keep the organization’s system protected from data breaches, cyber threats, and more. This includes expenses for getting cybersecurity software, hiring cybersecurity employees, and establishing cybersecurity training programs. Obtaining…
Journal #6
Cyber technology has changed how we work for the better, but it can also make it easier for employees to do the wrong things. For example, when employees gain access to company information, there is a possiblity for them to get confidential information or tamper with digital files for their own benefit. For example, if…
Journal #5
C – Create app that rates software Y – Yacht GPS software that I secure B – Bug bounty hunting E – Ethical Hacking R – Risk/Vulnerability testing S – Security architecture designing E – Encryption services C – Cloud security specialist U – Undercover intrusion testing R – Reporting risks in the infrastructure and…
Journal #4
The United States of America has one of the most advanced cybersecurity systems in the world. When compared to countries with “less” developed digital infrastructures, it is straightforward to set side by side the various factors that make it up. In this example, I will compare and contrast the cybersecurity risks between the United States…
Journal #3
According to the National Library of Medicine, The four ethical issues that arise when storing electronic information, or electronic health records, are “privacy and confidentiality, security breaches, system implementation, and data inaccuracies”. The first ethical concern, privacy, is the amount of protection that a person has when their information is inserted into the system. In…
Journal #2
Old Dominion University offers many majors including over “73 bachelor’s degrees, 70 master’s degrees, 35 doctoral degrees”. These spread into a wide variety of fields such as STEM, business, arts, and education. Of these majors, I believe four of them can relate to cybersecurity. The first, and maybe the most obvious, major that is related…
Journal #1
Hello, my name is Jacob Rivera and I first heard about cybersecurity in my senior year of high school. There was a club that was hosted by one of my teachers and encouraged students to join. At the time, I still did not know what I wanted to major in and thought nothing of it…