How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Approaching the development of cyber-policy and -infrastructure requires a nuanced understanding of the inherent challenges posed by the “short arm” of predictive knowledge in the dynamic realm of cybersecurity. Given the rapidly evolving nature of cyber threats, policies…
Journal #12
How does cyber technology impact interactions between offenders and victims? The overlap between criminal justice and cybercrime is substantial and reflects the evolving nature of crime in the digital age. Criminal justice professionals, including law enforcement, prosecutors, and investigators, now grapple with offenses that extend beyond traditional physical boundaries into the realm of cyberspace. Cybercrime…
Journal #11
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? The overlap between criminal justice and cybercrime is substantial and reflects the evolving nature of crime in the digital age. Criminal justice professionals, including law enforcement, prosecutors, and investigators, now grapple with offenses…
Journal #10
How do engineers make cyber networks safer? Engineers play a pivotal role in enhancing the security of cyber networks through a multifaceted approach. First and foremost, they design and implement robust encryption protocols to safeguard data integrity and confidentiality, ensuring that sensitive information remains protected from unauthorized access. Engineers develop and deploy intrusion detection and…
Journal #9
Describe three ways that computers have made the world safer and less safe. Computers have played a dual role in shaping the safety landscape of the modern world, exhibiting both positive and negative impacts. On the positive side, computers have significantly enhanced safety in various domains. In the automotive industry, advanced computer systems contribute to…
Journal #8
How can you tell if your computer is safe? A secure computer typically exhibits several key characteristics. First and foremost, up-to-date antivirus and anti-malware software should be installed and regularly updated to protect against the latest threats. A secure computer also benefits from a robust firewall, which acts as a barrier against unauthorized access. Regular…
Journal #7
What are the costs and benefits of developing cybersecurity programs in business? Developing cybersecurity programs in business comes with both costs and benefits. On the cost side, there are financial investments required for implementing robust cybersecurity measures, including the acquisition of cutting-edge security technologies, ongoing employee training programs, and the hiring or retention of cybersecurity…
Journal #6
How has cyber technology created opportunities for workplace deviance? While cyber technology has undoubtedly revolutionized workplaces and brought numerous benefits, it has also created opportunities for workplace deviance, introducing new avenues for individuals to engage in unethical or disruptive behaviors. One prominent example is the misuse of company resources, such as computers and internet access,…
Journal #5
Create app that rates software.Yacht GPS software that is secureBeach house security systemElementary school cyber risk accessorRemote start from phone (making it easier)Self making foodEveryone Charging people for cyber consulting servicesUsing something that was already created and making it betterRisk analysis companyIncident Response services to organizations TeachingYield, investing in cyber companys
Journal #4
Compare cybersecurity risks in the U.S. and another country. The cyber risk between the United States and Ghana are both quite high based on my readings, reflecting the increasing connectivity and reliance on digital infrastructure in both regions. In Ghana the is a 85% spike in cyber attacks The interconnectedness of global cyberspace implies that…