Entry 13: How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

With the development of technology and its usage increasing, businesses are scrambling to put together an effective cyber policy and infrastructure to make sure that their information keeps its integrity. Crimes that are committed, at least in earlier years, were done person to person. There is this “short arm” of predictive knowledge because the government…

Entry 11: What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

The overlap between criminal justice and cybercrime is quite unclear. With the advancements in technology, the line is becoming even more blurred. A significant amount of crime that occurs is done with technology. Criminal justice, in simple terms, is the laws, policies, and procedures that are established and set in place from what is deemed…

Entry 10: How do engineers make cyber networks safer?

Cyber engineers have a very important job and responsibility. Especially today with the world becoming more technologically advanced and reliant, these systems need to be protected. Everything is done on a network. Whether that network is public or private and secured and unsecured is a different story but not complicated to tell. Or are they?…

Entry 8: How can you tell if your computer is safe?

Technology is constantly evolving. With these evolvements, there are new ways being discovered by hackers to break into our systems and cause problems. A computer, in my opinion, can’t be completely safe. While a computer can be considered safe fresh from the factory, what about when the computer reaches the user? The user is the…

Entry 5: Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.

Consulations of systems and designs. Yearly evalutions of cybersecurity policies. Back up data and store at remote locations. Education employees on cyber related risks. Remote access to data through virtual protection networks (VPNs) for remote employees. Secure connections to systems on facility spaces. Ethical hacking to find vulnerabilities. Controlled access of data through multifactor authentication….