When developing cyber-policy and framing infrastructure, we must understand what threats are faced. Most technology is developed with the intention that it will be used for the greater good. In the past science and the advancement of technology have developed without fully understanding the capabilities of what has been created. A good example of this was the...
How does cyber technology impact interactions between offenders and victims?
Cyber technology has impacted interactions between victims and offenders by creating a new world in which most traditional crimes can take place. It has been shown that anonymity has a hand in this. Users online can interact anonymously, which may leave some offenders feeling more comfortable in carrying out their crimes. In a traditional harassment case, in...
Module 12 – What is the overlap between criminal justice and cyber crime? How does this overlap relate to the other disciplines discussed in this class?
As technology has become entangled in nearly everyone’s life, it has created a new focus on crimes committed over the internet. These crimes are committed in every aspect of society. Legislation has fallen behind the increasing prevalence of these crimes. Companies scramble to keep their defenses up to date with rapidly evolving technology. In minutes, a hacker...
Module 11 – Describe three ways that computers have made the world safer and less safe.
Computers have benefited society for decades. As technology has improved, and the internet has been accessible to most, it has made the world safer, but also a more dangerous place. Computers have incredible power and allow humans to process data and information beyond the limits of a person. One way computers have made the world safer is with advanced weather...
Module 9 – How can you tell if your computer is safe
There are many ways you can tell if a computer is safe, but it takes multiple layers of protection. It would be unwise to say that just because your computer is running antivirus, that you 100% free of threats. A computer should be protected not just from Malware, but physical threats as well. It is important to lock down a computer and if a PC is used in...
Module 8 – What are the costs and benefits of developing cybersecurity programs in business?
Although costs for developing a cybersecurity program in a business can be easily determined in a dollar sense, the benefits always outweigh the initial cost. “the average cost of a breach in 2020 is $3.86 million” – (https://inspiredelearning.com/security-awareness/). With these numbers in mind, it is easy to see how the cost of starting and continuing a cyber...
Module 6 – How has cyber technology created opportunities for workplace deviance?
Technology has created many opportunities for workplace deviance. Cybercrime or crime in general is described as “White-Collar Crime”. White-collar crime refers to a crime normally committed by professionals in a workplace environment. The integration of technology into business has helped with productivity and enabled businesses to work more efficiently at...
Module 5 – CYBERSECURITY
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Cyber warfare for national defenseYearly penetration testing serviceBuild out a secure office networkEnterprise cyber defense teamRecovery servicesStrengthen U.S. cybersecurity legislation with a organizations like CISAEthical hackingCreate comprehensive security...
Module 4 – Compare cybersecurity risks in the U.S. and another country
Comparing Cyber Security risks between the United States and other countries will show many similarities. Specifically looking at the comparisons between China’s Risks and our own. Both our countries have critical infrastructure such as power grids. Security regarding the safe keeping of national secrets and the need to keep up a constant defense against...
Module 3 – Describe four ethical issues that arise when storing electronic information about individuals.
Informed consent – How many times have you accepted a Terms of Service agreement without reading it? Do you know how your data will be used and stored once you agree? Big data has a value on it. Social Media, E-commerce websites, just about every online service collects information from all of us. That data can be sold or shared without your knowledge. It can...