Journal #11

Criminal justice and cybercrime relate in a numerous way that the overlap between the two is no surprise at all. The second base word in cybercrime is crime which means that this threat is something that is watched over by the criminal justice system. With the use of technology expanding cybercrimes are at an all time high in this trending period of time with new media and devices continuing to keep progressing. Some examples of cybercrimes are hacking, cyber fraud, cyber bullying, cyber terrorism, child pornography, cyber attacks, digital piracy, and internet sex crimes. The most common cybercrimes from the list are hacking which is the gaining of unauthorized access to your network to get private information for hackers personal good, the next common crime is digital piracy it is the illegal copying and distribution of copyrighted material from the internet without any consent from the original creator the most frequent outlets criminals do this for is music and film like tv shows or movies. The last most common crime from the list is cyberbullying which is the use of technology to threaten, harass, embarrass, or target another person online typically on social media platforms on fake accounts to cover aggressors true identity. Just because these crimes are done online doesn’t make you any less of a criminal from committing a physical crime. Everything done in the dark comes to light and your identity online will not be private for long with advanced police technology they can easily track a criminals address and true identity. The overlap between criminal justice and cybersecurity is impactful and will constantly evolve with technology. This overlap also relates to other disciplines we learned in class like in week thirteen where we discussed the importance of security and how physical security can help protect us just as much as cybersecurity or in week eleven where we talked about the different versions of cyber attacks and how we can avoid those types of threats.

Leave a Reply

Your email address will not be published. Required fields are marked *