The first thing that we must have in order to address this “short arm” of predictive knowledge when it comes to the development of cyber-policy, is putting those knowledgeable and qualified to understand and discuss such topics in the position of policy development because of the dynamic nature of what we’re talking about. Over the…
ePortfolio entry #12 – How does cyber technology impact interactions between offenders and victims?
I think to be able to answer that question thoroughly you need to know the crime that is at the heart of the discussion. It’s my belief that in most scenarios it can be both positive and negative, then again at either extreme you have instances where it is more positive then negative and then…
ePortfolio entry #11 – What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
The overlap between criminal justice and cybercrime is that technology (cyberspace) is simply another avenue for crime to be committed. Many of the same crimes that we see in the physical world like identity theft, buying/selling illegal drugs, stealing money, etc are being done in cyberspace. While many cybercrimes do have roots in the physical…
ePortfolio entry #10 – How do engineers make cyber networks safer?
The safety of the network I think depends on the use of a network. Technically a wire between two computers is a network, and it would have different safeguards in place then say interconnecting resources across several different regions, availability zones, and cloud providers. But generally speaking I think the best approach to make a…
ePortfolio entry #9 – Describe three ways that computers have made the world safer and less safe.
One of the ways that computers have made the world safer is their use is in the world of medicine. Just look at the recent breakthroughs with covid19. The time that it took for researchers around the world to communicate with each other, run billions of simulations on the gene sequence once they received it,…
ePortfolio entry #8 – How can you tell if your computer is safe?
How can you tell if your computer is safe? Well that’s a trick question. You can never be certain that your computer is safe. You can check to see if your computer is safer then not, but the existence of the zero day vulnerability means that no one can be completely sure your computer is…
ePortfolio entry # 7 – What are the costs and benefits of developing cybersecurity programs in business?
In starting business there are always costs associated with everything you do, one of the jobs of senior leadership is determining where the best value and most benefit would come from money spent. Be it R&D or Cybersecurity there is a cost and benefit to it all. The first cost that I think of when…
ePortfolio entry #6 – How has cyber technology created opportunities for workplace deviance?
To be able to discuss this topic I first wanted to make sure I had a clear understanding of what deviance was. Deviance according to thefreedictionary.com is, “divergence from the accepted social norms of behavior. Deviance can be beneficial to society if unorthodox behavior leads to creativity or innovation. Alternatively deviance may be harmful as…
ePortfolio #5 – Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity
C – Create an app that scans the dark web and gives you an alert anytime your information is found Y – Yaggi Atenna app for your phone B – Bluesnarfing protection software for your home network E – Encryption software that isn’t breakable by quantum computing R – Remote backup software that that is…
ePortfolio entry #4 – Compare cybersecurity risks in the U.S. and another country
I think when comparing the cybersecurity risks here in the U.S. with that of another country the similarities are strikingly similar. Let’s use China as an example. China’s inevitable rise to the status of superpower makes it a good country to compare cybersecurity risks to the U.S., as apposed to a less developed unequal nation….