How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? The short arm of predictive knowledge is the ability to possess the information to forecast a behavior in short order. The ability to have the knowledge to foresee a particular behavior usually originates from historical information, like the…
Author: jwils082
Journal Entry #12
How does cyber technology impact interactions between offenders and victims? The invention of technology has made our lives a little better by providing us with devices like hearing aids, television remote controls, telecommunication devices that can communicate with practically anyone anywhere on earth, and even self-driving cars are not too far off on the horizon….
Journal Entry #11
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? “Cybercrime is any criminal activity that utilizes a computer, network device, or network.” (Brush, 2021). Cybercrimes can range from a variety of offenses including identity theft, fraud, harassment, and even business or government…
Journal Entry #10
How do engineers make cyber networks safer? Cybersecurity engineers, sometimes named security engineer, data security engineer, or web security engineer, are accountable for safeguarding computer systems and networks tied into cyberspace from adversarial threats and attacks (Gallinelli, 2019). In other words, they come up with ways to protect systems, devices, and networks. More specifically, the…
Journal Entry #9
Describe three ways that computers have made the world safer and less safe. The invention of computers to society has been a double-edged sword as to the positive and negative impacts on society. Below are three ways computers have made the world safer and made the world more dangerous. The three ways computers have made…
Journal Entry #8
How can you tell if your computer is safe? It is important to know if your computer is safe from unauthorized access. But how can you tell? In my opinion, you should look at it from two points of view, physical and cyber. Physical Measures. Laptop computers are a highly sought-after item for thieves as…
Journal Entry #7
What are the costs and benefits of developing cybersecurity programs in business? All businesses are potential cyber targets regardless of their size; therefore, it is imperative to train your staff on how to mitigate the risk of cyber incidents. It is a fact that humans are the number one reason (Why Human Error is…
Journal Entry #6
How has cyber technology created opportunities for workplace deviance? Technology has made society a little bit easier for us to enjoy. Food, cars, artwork, even World War II military aircraft can be delivered anywhere with a simple stroke of some keys and buttons. It really is a marvelous and exciting time we live in….
Journal Entry #5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Create app that captures your social fingerprint.Yoga software that can monitor your progress.Build a better firewall that catches hacker bots.Encryption software that better protects text messagesRun a cybersecurity consultant firm Speak as a cybersecurity specialist to the elderly about protecting themselves…
Journal Entry #4
Compare cybersecurity risks in the U.S. and another country. I compared the cybersecurity risks between the United States and Russia. What I found doing my research into this question was that all the countries in the world are attacked by cyber criminals. And there is no denying that wherever in the world you are…