Journal entry #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? We should approach the development of cyber-policy and infrastructure by continuously having a strong defense system. The same way our technology and defense for systems improve, so will attackers and their ways of breaching networks. In cybersecurity, if…

Journal entry #12

How does cyber technology impact interactions between offenders and victims? With technology advancing before us and criminals finding new ways to have deviant behavior, the interaction between offenders and victims has forever changed. Before there was any special advanced technology, people were told they were going to have some type of deviant behavior by their…

Journal entry #11

1. What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? In the society we live in today, technology continues to advance beyond our imagination and the same goes for crime. People are committing crimes through the internet rather than doing it in…

Journal entry #10

1. How do engineers make cyber networks safer? Engineering and cyber security are closely related careers and can’t work without one another. Engineers ensure that networks are safe, secure, and running for optimal performance. For people working as engineers in the public service and utilities, they’re always making sure that services are always reliable and…

Journal entry #9

1. Describe three ways that computers have made the world safer and less safe. In today’s society we live in a world where technology is around us everywhere and has made it so that we can live an easier life. If all the technology in the world would somehow stop working everyone would go into…

 Journal entry #8

1.  How can you tell if your computer is safe? With all the different technologies being used in society, many people have sensitive information on their devices that can be used against you if they fall into the wrong hands. There are plenty of ways that you can tell if your computer is UNSAFE but…

Journal entry #7

1. What are the costs and benefits of developing cybersecurity programs in business? With technology being used in almost every business, it can be safe to say that every business should have some type of cyber security implemented into their systems to ensure that everyone’s data is safe. Not every business is large and has…

Journal entry #6

How has cyber technology created opportunities for workplace deviance? Today with so much technology being used in the workplace, it is apparent to see that deviance behavior continues to happen and that is because information stored online is a lot easier to lose through someone with the wrong intent. Workplace deviance happens when an individual…

Journal entry #5

Create app that rates software. Yacht GPS software that is secure Backup program  Embezzlement apps Risk management professional Software tools Encryption and decryption Cyber training programs Uber GPS software that is secure Remediation Intrusion detection reports Tech support Youth cyber programs 

Journal entry #4

Cyber-attacks come in all shapes and forms such as phishing, malicious malware, misuse of confidential information, ransomware, data leakage, and many more. Companies should already be aware that individuals are trying to steal their information at any given moment and should have a set of practices to ensure their information and data is secured properly,…