e-portfolio entry #7

 How does cyber technology impact interactions between offenders and victims? 2. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Cybertechnology impacts individual users, offenders, and our society as a whole. The most obvious interaction formed due to creation would be the ease of access to targets….

e-portfolio entry #6

1. How do engineers make cyber networks safer? 2. What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Engineers make cybernetworks safer by implementing different strategies, techniques, and technologies to create resilient and secure cybernetworks. Many different methods including code or hardware can…

e-portfolio entry #5

1.  How can you tell if your computer is safe? 2. Describe three ways that computers have made the world safer and less safe. How I can tell if my computer is safe is by simply doing a malware and virus check, then doing a diagnostic test through my settings. Usually, my computer will just tell me…

ePortfolio entry # 4

1. What are the costs and benefits of developing cybersecurity programs in business? The cost and benefits of developing cybersecurity programs in business is essential to the success and daily functioning of most businesses today. The costs of having a cyber security program are financial investments-“This includes acquiring security software, hiring skilled personnel, conducting regular security…

E-portfolio entry #3

How has cyber technology created opportunities for workplace deviance? Cyber Technology although essential and resourceful in our daily lives unfortunately creates various avenues for workplace deviance. Workplace deviance can derive from different factors depending on the workplace environment. These factors can include poor management, peer influence, job dissatisfaction, workplace culture, opportunities, boredom, and usually individual…

E-portfolio entry #2

1. Describe four ethical issues that arise when storing electronic information about individuals. 2. Compare cybersecurity risks in the U.S. and another country. 1. When one is storing personal information of users there can be a multitude of possibilities and problems, of these problems the ones I think are of biggest concern are privacy concerns….

E-portfolio Entry #1

The reason I am interested in Cybersecurity technology is because I have playing videogames for pretty long time, starting in 2012, when I was 9, I got my first Xbox 360. I loved playing all day after I got home from school. As I got older and so did the games I grew up enjoying…