https://docs.google.com/document/d/1_u6_8cLCnSs4jtp1iLv15En-nJCLGfRvkIwQLEsE4eo/edit?usp=sharing Analytical Paper Abstract The aim of this analytical paper is to identify and evaluate the social meaning and impact of cybersecurity-related technical systems. By incorporating previous learnings and assignments, a carefully crafting concluding analysis will follow, tying the concepts together. Adopting an interdisciplinary approach, each aspect of the studies will be scrutinized to deepen…
Category: CYSE200T
Journal Entry 13
How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Developing cyber-policy and infrastructure requires a careful balance between addressing current challenges and preparing for future uncertainties. Given the “short arm” of predictive knowledge, which means we can’t predict everything that might happen, a flexible and adaptive approach…
Journal Entry 12
Cybertechnology & Offender vs. Victim: Cyber technology has contributed to the interactions between offenders and victims. Within the digital realm, we can see the drastic increase in offenders’ anonymity and reach in terms of global offenses. Because of our growing digital advances, cyber criminals have taken the opportunity to attack more global territories. Cyber technology…
Journal Entry 11
Overlap between Criminal Justice & Cybersecurity: Taking an interdisciplinary approach to any study can evolve our ways of thinking. In the cyber field, adopting new methods of thinking can ignite growth. While criminal justice provides the institutional framework for addressing cybercrime through law enforcement and legal proceedings, disciplines such as psychology and social science, economics,…
Journal Entry 10
How do engineers make cyber networks safer: Engineers play a major role in increasing the safety and security of cyber networks through varying approaches and other diverse strategies/ technologies. Engineers design and implement forms of encryption techniques to protect information and sensitive data transmitted through different networks. By using these techniques, encryption algorithms and protocols,…
Journal Entry 09
Have computers made the world safer: for better or worse? Computers have made the world safer and now play pivotal roles in our day to day operations, on both the global and local scales. We use computers for many different attributes of our lives. It has become an ever evolving plane. Some of our more…
Journal Entry 08
How can you tell if your computer is safe, can it be safe: It takes work to ensure that your computer is safe for use. There are many different elements on our digital surfaces that can threaten and jeopardize the safety of our devices. Some of the most crucial steps to ensuring a safe browsing…
Journal Entry 07
Costs vs. Benefits of Cybersecurity Programs in Businesses: Developing cybersecurity programs in businesses can involve both heavy costs and unique benefits: Costs: Building and maintaining cybersecurity programs can come with a lot of costs and investments. It can become costly to keep effective programs in place and ensure they are working at all times, updating…
Journal Entry 06
Workplace deviance with Technology: The introduction and inclusion of cyber technology has created a bountiful amount of opportunity for workplace deviance. The following are some of the ways this deviance may occur: Social Media This refers to the act of employees defacing or critically commenting on their workplace, coworkers, management, etc. Taking sensitive, or confidential,…
Journal Entry 05
Conduct security checks and monitoring network activityYielding data regarding the effectiveness of security training and policiesBuilding security protocols for an organizationEvacuating malicious code against a device/networkRunning safety and security training programs Selling firewall and security programsEthical hacking and penetration testingCreating breach reports and data analysisUtilizing firewall software and installing protocols in a deviceRecovering missing or…