Journal Week 6

1. Cyber breaches are on the increase, making it more critical than ever for businesses to sit down and discuss their strategies and technology. Aside from providing insurers in place to help mitigate the damage, developing such plans is difficult due to the rapid evolution of technology. Aside from developing, it’s a difficult topic to understand in general, especially for those who aren’t necessarily in the industry. When implementing these strategies, risk management is also crucial. A organization must consider a variety of considerations, including the importance of the customer’s records. There is an easy approach to how to plan for an attack. Unfortunately, it is more about where an attack will occur than whether one will occur. Any threats would be spontaneous so the organization is unlikely to be aware of their impending arrival. The best you can do is prepare for it and only recover about an assault after it has happened. The prices of these assaults and hacks are continuing to skyrocket year after year. When attempting to incorporate those measures and infrastructure, there are a host of considerations to keep in mind. Cyber strategies must be considered by any organization now, as cyber threats are becoming more common and expensive.

2.Cyber Technology creates a huge impact interactions between offenders and victims. The internet creates a lot of opportunities to harm and victimize other people on a scale that was not possible before. Offenders are able to target people solely through the internet or use the internet to find the personal information of people they may be trying to stalk or harass in real life. Especially on social media, people tend to post an abundance of personal information that offenders may use against you. For example, posting pictures while on vacation could inform a possible offender that your house is empty and could easily be robbed. Another way the internet sets up people to be victimized is by sharing of something that was supposed to be private on a public form, shared without consent, or even used to blackmail. Sometimes, these can even go viral. Even more scary is there has been instances of webcams being hacked on personal computers. Predators also thrive on the internet, trying to convince their victims to meet them in person, more than likely with evil intentions. Tv shows like To Catch a Predator highlight this type of criminal behavior on the internet. The internet is not all bad, but hopefully cyber technology developments will help make it a safer place in the future.

Leave a Reply

Your email address will not be published. Required fields are marked *