Journal #13

How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge? Due to the fact that there are so many limitations and unknowns that exist regarding cyber policy and cyber infrastructure, it must be approached in a way that not only finds balance among those limitations but also uses…

Journal #12

How does cyber technology impact interactions between offenders and victims? Advancements in cyber technology have greatly impacted the interactions between offenders and victims; in some ways it’s allowed for heightened protection for victims and those vulnerable to becoming victims from offenders, and in other ways has only allowed for them to be exploited in more…

Journal #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to other disciplines discussed in this class? One of the primary goals for criminal justice researchers and scholars is to focus on developing strategies that aid in protecting different entities from crimes. This can be further applied in a technological sense…

Journal #10

How do engineers make cyber networks safer? Arguably one of the most important aspects of engineers’ job is to create safe cyber networks, and update them when needed to continue improving upon their safety. This starts with the design of a particular system by implementing a multitude of security measures within the design to protect…

Journal #9

Describe three ways that computers have made the world safer and less safe. Computers have become a key factor in the everyday lives of most people, in some ways creating a safer world for people, and in other ways making it unsafe. Regarding the ways computers have made us safer, they’ve completely improved the way…

Journal #8

How can you tell if your computer is safe? When using a computer, one of the first steps in operating it should be determining whether or not it is safe to use; this can be done in a multitude of ways. You should check to see if there are any antivirus or antimalware programs available…

Journal #7

While technological advancements have aided the development of businesses, it also raises the question regarding new issues relating to cybersecurity and the prevalence of cybersecurity programs in businesses, which has various costs and benefits. One of the major costs comes with actually implementing the necessary measures within the company, which requires some kind of financial…

Journal #6

As the risk of cybersecurity attacks has grown in recent years, many big businesses have put effort into devoting time, money and energy into protecting their online information by ensuring there are safeguards in place to limit these risks. The good news is that a lot of these businesses have been successful; the bad news…

Journal #5

Creating a mechanism that makes a strong password. Yoga company; creating a framework for their company’s data Building computers Erasing data on devices that is faulty of carries viruses. Removing viruses from computers Sending data company wide to employees regarding cybersecurity issues Ethically hacking computers to find information Controlling a control server that communicates with…

Journal #4

Compare cybersecurity risks in the U.S. and another country. Every country has cybersecurity risks that emerge that are unique to their country. In the following post I’m going to discuss some of the similarities and differences regarding some of the cybersecurity risks that affect the United States and the United Kingdom (UK). One similarity is…