The development of cyber-policy and -infrastructure is important to us, despite the lack of predictive knowledge to curb technological effects. We should use moderate control over technology because too little control allows people to do anything and too much control allows the government to spy on the people. As technology gets more complex, there should…
Journal 12
Cyber technology impacts interaction between offenders and victims. It makes it easier for offenders to reach out to victims. One example is social media. Social media allows people to create fake profiles and message people directly without needing to follow them. Another technology that makes it easier for people to find users in a social…
Journal 11
Cybercrime can be related to criminal justice. Cybercrime is defined as the involvement of technology to commit a crime. Since there is a crime involved, criminal justice can address the legal implications of the crime. A cybercrime can be an example of a white-collar crime. A white-collar crime is committed in the workforce by an…
Journal 10
There are many ways that engineers make cyber networks safer. They have to determine the requirements for the system protection and create new ways to solve issues that occur in the system. An antivirus is useful for protection against outside infiltration and prevent hackers from injecting ads into people’s accounts to find their information. A…
Journal 9
There are three ways that computer make our world safe and less safe at the same time. The first way is that computers depend on the internet for everything. In our modern world, we have to use the internet to go to school, chat on social media, and read the news. In these sectors, the…
Journal 8
There are many ways to tell if your computer is safe. The most important thing is the passwords. Don’t use the same passwords because if someone knows one, then he/she has the means to break into your computer. Another method that keeps your computer safe is the browser. Tons of websites contain malware and other…
Journal 7
There are costs and benefits of developing cybersecurity programs in business. Oftentimes, the benefits of developing a cybersecurity program can be affordable for a company, especially in the long-term. Some benefits include a better reputation for the company, create additional career options for the company, and allow the employees to contribute their efforts for the…
Journal 6
Cyber technology creates opportunities for workplace deviance. Some examples include the access to mobile devices, development of software, and the growth of the internet. First, mobile devices are available to each employee, especially in the case of BYOD policies. With a portable device, there are many ways that mobile devices can function as a threat….
Journal 5
Create an online password generator or two-factor authentication app Yahoo alternative search engine that is decentralized and uses a better algorithm for search results Backpack that can jam a location or Bluetooth signal Email platform that automates and get rid of spam Rocket security for physical hardware Sim card protection for phone Encryption for storing…
Journal 4
There are many similarities and differences that pertain to the cybersecurity risk of the U.S. and China. First, they have a strong infrastructure to handle the traffic of internet that are run to their servers. On the contrary, the U.S. have no regulation and intervention on the internet, besides matters that relate to the federal…