Throughout the semester, I’ve learned that the ways that cyber-technology influences our life. I’ve also learned how thorough cyber policy and efficient, well protected infrastructure is much harder to develop than I might have initially assumed. Lawmakers, cyber engineers, criminologists, scholars, and more have to take much into consideration when developing plans and rules. Further,…
Journal #12
The interactions between traditional offenders and victims generally require the offender and victim to be within close proximity to one another. Whether the offender intends to steal, harass, or physically harm the victim, they could not do it without entering their space in some capacity. This also means that, for the most part, victims will…
Journal #11
The field of criminal justice is broad and focuses on a plethora of crimes and crime typologies. As time as gone on, and technology has evolved, the need for a criminal justice focus on cybercrime and its consequences has continued to grow. Initially, there might not seem to be any overlap between them, but they…
Journal #10
When building cyber networks, several parties are involved in their conception, creation, and maintenance. For cybersecurity and network engineers, they help build and maintain the network through safe practices and commonly used protocols. Security engineers generally start by developing standards and practices based on both industry standards and organization specific needs. This is where the…
Journal #9
It goes without saying that computers have changed our lives. Computers have created new opportunities, presented new challenges for us to overcome, and enabled us to be more connected with one another. Aside from providing fun or being a convenient, useful tool, computers can also keep us safe. First, computers help us protect our information….
Journal #8
Keeping your computer safe and secure is extremely important when it comes to protecting your information. Safe passwords kept in password managers, VPNs, pop-up blockers, and other tools are ultimately useless if the computer itself isn’t safe. Unfortunately, there’s no way to differentiate a “clean” computer from an “infected” one by just looking at it….
Journal #7
Running a business is an extremely hands-on process, even before considering security concerns. Developing a cybersecurity program, especially for small businesses, can be seen as an almost insurmountable task. However, developing such a program has incredible benefits to the business owner(s), the employees, third-party vendors the business may work with, and the clientele being served….
Journal #6
With the rise of cyber technology and “bring your own device” to work policies, there are more opportunities for workplace deviance than ever before. Workplace deviance is traditionally defined as purposeful attempts to sabotage an organization. Employees will create problems within the organization, typically interpersonal but not always, to disrupt the workplace. It could be…
Journal #5
Below are some legal (and maybe even fun!) ways to make money in cybersecurity. Create an app that notifies people when data is found in any breaches Youth programs that children and teens can sign up for to learn about cybersecurity Bug bounties Expert in penetration testing Review and recommend corrections based on audit log…
Journal #4
The web, and by extension technology, is generally universal. Due to the design of technology, there are few major or glaring differences between cybersecurity in the United States and other countries such as England in the United Kingdom. Many of the same threats exist alongside the same methods to address and eliminate any cybersecurity events…