Journal #13

Developing cyber-policy and infrastructure is something that is necessary, especially as society continues to make even greater technological advances. With the technological advances we have accomplished, a great deal of caution and responsibility comes into play when we think about the implications of the things that we create. When deciding to create new technologies, we…

Journal #10

Much time and effort goes into ensuring the safety and security of individuals as they interact with digital systems. A great deal of trust is given on the part of individuals that rely on the who’s responsibility it is to ensure that our systems remain as safe as possible. While it is impossible to ensure…

Journal #9

 There are both positives and negatives to the advances in computer technology that society has accomplished. The average person uses some sort of computer technology in their everyday lives. From our smart phones, motor vehicles, even our home security systems, computers have created a safer world for us all. One way we can say that…

Journal #8

 Engaging in safe practices while utilizing our devices is of the utmost importance. There are various ways that we can ensure the safety of our computers and other devices from the malicious attacks that cyber criminals attempt. With threats from malicious code that criminals may use to phishing and other means that these cyber criminals…

Journal #6

Cyber technology has worked its way into nearly all aspects of our daily lives, personal and professional. Through its various uses it has become an innovative way to socialize, search for and store information, but for some it has become a means to victimize other people and organizations for monetary gains and more. In the…

Journal #3

In our society where we rely on the technological advances that mankind has achieved in the late 20th and early 21st centuries, storing information electronically has become the common practice. However, when storing people’s personal information, ethical issues arise in how we go about doing so. With cyber criminals seeking to exploit and steal this…

Journal #12

 Cyber technology has afforded both law-abiding citizens, as well as criminals, ease of access regarding how they communicate and interact with others online. People now have at their fingertips the ability to reach loved ones and friends thousands of miles away in an instant. This is also true for criminals who prey on the unfortunate,…

Journal #11

Criminal Justice and Cybercrime are closely related due to a number of different factors. Since technology is often being used by criminals to commit criminal acts, they in fact are committing cybercrime. There are numerous different ways that criminal justice and cybercrime overlap. One being how criminologist focus on explaining human behavior or “human factors”,…

Journal #7

 It is even more crucial now than ever before for businesses to develop a proper cybersecurity program. With the company’s and customer’s critical information at risk of being stolen by adversaries, the only thing that can help mitigate the associated risks is to have a good cybersecurity program, and if the don’t, the costs can…

Journal #5

Create and code video games. Youth organization that focuses on coding. Blog channel that’ll teach others the basics of cybersecurity. Entrepreneurship that focuses on cyber related mentorship for start-up companies Red team service. (ethical hacking) Software Development E-learning courses focused on cybersecurity. Computer emergency response team (become a member of a CERT) Unmanned underwater vehicle…