ePortfolio entry #13 – How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

The first thing that we must have in order to address this “short arm” of predictive knowledge when it comes to the development of cyber-policy, is putting those knowledgeable and qualified to understand and discuss such topics in the position of policy development because of the dynamic nature of what we’re talking about. Over the…

ePortfolio entry #11 – What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

The overlap between criminal justice and cybercrime is that technology (cyberspace) is simply another avenue for crime to be committed. Many of the same crimes that we see in the physical world like identity theft, buying/selling illegal drugs, stealing money, etc are being done in cyberspace. While many cybercrimes do have roots in the physical…

ePortfolio entry #10 – How do engineers make cyber networks safer?

The safety of the network I think depends on the use of a network. Technically a wire between two computers is a network, and it would have different safeguards in place then say interconnecting resources across several different regions, availability zones, and cloud providers. But generally speaking I think the best approach to make a…