It is getting increasingly difficult for security professionals to keep up with the exponential growth of cyber infrastructure. Therefore, there are a lack of accurate predictions of the future development of cyber policy and infrastructure. Security professionals should respond to this dilemma by creating protection and security systems that bypass our future expectations. For example,…
Journal #12
Before cyber technology became widespread, most victims of crime were close in vicinity to their victims. Actions such as bullying and harassment were things that happened face to face, arguably making them more personal and serious which increased the likelihood of law enforcement discovering and being involved in the incident. With the implementation of cyber…
Journal #11
Over the past 20 years, criminal justice and cybercrime have become increasingly intertwined. Cybercrime has emerged due to the relatively lesser difficulty and higher safety that comes with committing crimes using technology or the internet. Criminology and knowledge of criminal justice is important in the cyber space because it can help identify likely victims and…
Journal #10
Engineers know that in order to make cyber networks safer, they must make sure the systems they build are trustworthy and meet the correct security requirements. This means making sure that all of the base architecture of the cyber network is designed carefully with these strict security principles in mind. Businesses often have assets which…
Journal #9
Computers have undeniably had a huge impact on our society for better and worse. One benefit computers have added is more speed when it comes to calculations. From simple arithmetic equations to complex mathematical formulas with live data, computers offer fast and efficient speeds which can be applied to areas of society such as finance…
Journal 8
Computers, especially ones connected to a network can never be 100% safe. New vulnerabilities and exploits are being discovered every day and cyber security professionals are in a seemingly never ending race with hackers and other malicious threats that attempt to compromise computers. However, there are many actions we can take in order to make…
Journal #7
Cyber security programs encompass all business efforts at maintaining the security of their information systems. For example cybersecurity consulting often allows a business to get recommendations on potential security risks as well as the impacts of potential changes. These services are often outsourced to companies such as Leidos, who are then paid for their services….
Journal #6
Workplace deviance generally encompasses anything that employees do that doesn’t align with the company’s goals or potentially damages the company. This usually includes actions such as theft and vandalism, as well as retaliating against other employees or treating employees harshly. Computers and other information technology have opened up even more opportunities for workplace deviance. One…
Journal #5
Chrome extension that scans emails for phising Youtube clone for cybersecurity and tech related videos Business website verifier for trusted sites like PayPal and amazon to protect against dns poisoning/typo squatting Engaging training videos and labs for new hires about using and securing workstations Ransomware protector that stops it from propagating over the network and…
Journal 4
Being a generally successful and wealthy country, the United States faces slightly different cybersecurity risks compared to a lower GDP country like Nigeria. The United States has a plethora of corporations, making them a lucrative target for phishing emails. This is backed up in Alex Kigerls research as it states the United States is the…