E-Portfolio entry #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? We should use the cyber-policy as guidelines to improve the performance of the infrastructure by implementing more policies. Implementing better policies for providing protection again cyber-attacks, making it necessary that authorization is required to be able to be…

E-Portfolio entry #12

How does cyber technology impact interactions between offenders and victims? How does cyber technology impact interactions between offenders and victims? To explain how Cyber Technology is used and has impacted the interactions between offenders and victims which is why I will be using Cyber Stalking and Cyber Harassment as examples. For context the first topic,…

E-Portfolio entry # 11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? What is the overlap between Criminal Justice and Cybercrime? The overlap connection between criminal Justice and cybercrime would be technology and digital Forensics. What are Digital Forensics? Digital Forensics is a branch of…

E-Portfolio entry #10

How do engineers make cyber networks safer? As society become more advanced in technology and becomes more incorporated into daily life the more popular cyber-crime will arise to higher likelihood of deviance crime considering how easy it is to gain access to a computer. How do engineers make cyber networks safer? In order to counter…

E-Portfolio entry #9

Describe three ways that computers have made the world safer and less safe. Computers have many different functions to help identify users, setting boundaries and enable safe distribution of authorization threw the use of different methods. A database categorizes the information into different types that are ranked either high, moderate, low or none depending on…

E-Portfolio entry #8

How can you tell if your computer is safe? There are several options, 5 ways to be more specific, that can help you check if your computer’s security system is still intact by running some test scans. All 5 of these options are compatible to test run on almost every single computer despite the current…

E-Portfolio entry # 7

What are the costs and benefits of developing cybersecurity programs in business? In both businesses and companies Cyber programs are used often to help manage and provide protection and much more. Industrial companies, for example, are known that they specifically use risky models that not only does it weakens their infrastructure that isn’t really regulated…

E-Portfolio entry #6

How has Cyber technology created opportunities for workplace deviance? What exactly is the definition of Deviance? Well, the definition of Deviance is when a behavior, state, mannerism, and/or action that is either accepted meaning it follows or fits the social norms and expectation or is disproved and frowned upon because it opposes the expectations of…

E-Portfolio entry #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  For example: Create app that rates software.Yacht GPS software that is secureBecome a Cybersecurity analyst.Evaluate data collected in data base.Reprogramming softwareSecurity auditingEducate and guide future cybersecurity trainees.Create solutions to business organizations.Utilize all my experience working in the field of cybersecurity into book…

E-Portfolio entry #4

Compare cybersecurity risks in the U.S. and another country. The Cybersecurity risks in the United State of America has more Demographic difference between the other countries compared to the US is because the population is more diverse racially and ethnically. The result of the abundant number of mixed influences, can also present more threats the…