What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Journal 11

Criminal justice and cybercrime are an ever-changing relationship. Cybersecurity, and the cyber world in general changes all of the time. There are always new threats, vulnerabilities, or exploits that can be used. With that comes new crime opportunities. There is so much personal information on the internet that is very valuable to hackers. Criminal justice,…

How do engineers make cyber networks safer? Journal 10

Cyber security engineers have a very tough job to do. They have to make a network as capable as possible, while also making sure that the networks are very secure. Typically in the cyber world, security comes at a price of usability. This means that for every additional security measure, it can make the network…

How can you tell if your computer is safe? Journal 8

A safe computer is often a very subjective term depending on the person who is asked this question. As a cybersecurity professional, our definition of safe is often more complex and involved than the average user. A safe computer means that the system is not compromised by an adverse party, and it is operating as…

How has cyber technology created opportunities for workplace deviance? Journal 6

Cybersecurity, and technology in general has transformed the workplace in many different ways. Most of these aspects are positive, such as, increased productivity, easier file search methods, and less stress for the organization. However, this new battleground can open doors to negative outcomes too. Technology can be used both for good, and for bad purposes….

CYBERSECURITY Word Drop Journal 5

CYBERSECURITY C: Cyber intrusion detection system. Y: Yearly auditing security software. B: Blocking attacks via firewall installation. E: Engineering cybersecurity programs for organizations. R: Resolving cybersecurity threats or breaches. S: Securing open doors (vulnerabilities) in an organization E: Examining business operations to see weak points. C: Conducting a real world penetration test to see if…

Compare cybersecurity risks in the U.S. and another country. Journal 4

Cybersecurity is a constant battle, no matter what country. Here in the United States especially, most Americans have more information stored about them online than they actually have in paper! This completely changes the way of security. Other countries also have momentous amounts of information about their government and citizens stored in technology too. Domestically,…