Entry #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?  The approach when it comes to the development of cyber policy and infrastructure given the “short arm” of predictive knowledge should be thinking that by being a business, anything can happen.  Most small businesses do not store as…

Entry #12

How does cyber technology impact interactions between offenders and victims?  Cyber technology actually increases the interactions between offenders and victims.  The possibilities when it comes to the internet is extremely vast.  Meaning you can be getting terrorized by a person you do not even know from possibly another whole country.  Before people would actually have…

Entry #9

Describe 3 ways that computers have made the world safer and less safe.  There are plenty of reasons for both on how computers make the world safer and less safe.  Let us start off with how they make the world safer.  Computers have made it so that when you put some confidential information like card…

Entry #8

How can you tell if your computer is safe? There are many ways that a computer can get a virus.  Most of the time you would not even mean to get a virus on your computer.  All it takes is to open one wrong browser or open one wrong email and you have tons of…

Entry #7

What are the costs and benefits of developing cybersecurity programs in business?  The costs of developing different cybersecurity programs can be quite expensive.  However, the benefits can far outweigh the costs.  Depending on how much a business is willing to spend on a cybersecurity program can also tell a business how well it will do…

Entry #6

How has cyber security technology created opportunities for workplace deviance?  In the cyber world, when it comes to the workplace deviance, it has made it more popular.  Workplace deviance is when someone deliberately desires to cause harm to any type of organization or in a work space.  When it comes to this it is almost…

Entry #5

Create anti malware softwareYacht software that can avoid storms itself if detectedBiometrics readers to open certain filesElectric keyRendering files so they wont get a virusSelf encrypting filesEncrypting barcodesConstant changingUniversal passwordsRetinal file scannerIdentity protection cardsTelecommunication between vehiclesYouth coding camp

Entry #4

There are many risks when it comes to cyber security.  The whole world pretty much revolves around technology and with the ever growing economies of the world more and more information goes on to cloud servers.  Passwords and personal information is almost all stored in these servers.  Password theft is a pretty common risk when…

Entry #3

Although it is much easier to store information, easier does not mean better.  There are many ethical problems that come with storing information about individuals.  People always claim that the internet is a safe space for your information.  However, people’s information is pretty easily accessible through hackers by producing all different types of viruses or…

Cyber Engineers

When it comes to cyber security and networks something can always be improved upon.  In ways to make it more simple for the user and much more reliable or safe. Let us describe what a cyber engineer is. A cyber engineer is an engineer who applies electrical engineering to computer science so that they may…