Journal/Entry #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? The ethics involved with technology, cyberspaces, and the internet as a whole are complicated and unpredictable, as the rules and regulations of technology are always changing. The introduction of the internet has had a plethora of effects on…

Journal/Entry #12

How does cyber technology impact interactions between offenders and victims?  Stalking, harassment, and multiple other crimes have been prevalent long before the introduction of technology. When these crimes are committed in a physical space, different laws and regulations apply to the offenders when compared to crimes committed on the internet. With more information being available…

Journal/Entry #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Cybercrime remains a relatively new avenue of crime in America, with the first cybercrime law being passed in Florida in 1978. Due to the relative uneasiness and unfamiliarity around cybercrime, other disciplines can…

Journal/Entry #10

 How do engineers make cyber networks safer? Secure cyber networks are vital in order to ensure a system’s security, and the people behind those networks are just as important. Engineers perform a wide variety of tasks to ensure that risks and vulnerabilities are limited within a system. With constant updates and fixtures, engineers are able…

Journal/Entry #9

 Describe three ways that computers have made the world safer and less safe. Technology and computers have affected nearly every facet of modern-day life, making it nearly impossible for society to function without them. Computers grant us multitudes of advantages when it comes to tackling day-to-day life, especially when it comes to our security. Computers…

Journal/Entry #8

How can you tell if your computer is safe? Computers have become part of our everyday lives, with many occupations and security measures being reliant on their ability to function. Even personal computers for at-home use are expected to be secure and safe from malware and viruses. There are many avenues through which an individual…

Journal/Entry #7

 What are the costs and benefits of developing cybersecurity programs in business? With many facets of business becoming digital, companies must develop and maintain successful cybersecurity programs. Customer trust, client trust, and employee trust are all vital to the long-term success of an organization. These can all be ensured with well-developed cybersecurity programs, which go…

Journal/Entry #6

How has cyber technology created opportunities for workplace deviance? Workplace deviance has become a very common occurrence in the 21st century, as there is a multitude of situations where employees may become disgruntled enough to act out in harmful ways. With more companies and employers adopting online and digital practices, much more dangerous avenues of…

Journal/Entry #5

 Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  C-  Create cybersecurity training courses Y- Youtube videos educating people about cybersecurity B- Build an app E- Educate others about cybersecurity R- Research cybersecurity S- Selling Cybersecurity Products E- Electronic device building that aids cybersecurity C- Certifications  U- User…

Journal/Entry #4

Compare cybersecurity risks in the U.S. and another country. Cybercrimes are a unique crime, especially on an international scale. Unyielding to national borders and regulations, cybercrimes can be challenging to assess and control. There are multiple avenues through which cybercrime can be committed, with some being more advanced than others. One widespread method around the…