Journal #3

Cyber technology has opened a whole new method of deviance not just in the workplace but people who are not even associated with a company or organization. Technology is access able to almost everyone around the world. Making it easy for criminals to commit cybercrimes as the scope of the search for them would be so wide. Though its not the people who are on the outside who are the most dangerous its those who are on the inside. Obviously, you can’t start a business with out a team. So, you are left with vetting your employees. Not only are you responsible for vetting and verifying but you also must develop and implement access and a sort of security for your information and access to whatever you are using. Though people on the inside are also aware of this fact. They are the people with the most information on how security works, who operates it and its potential weaknesses. These criminals can engage by either being an informant or a physical disruptor/perpetrator. As an informant they are engaging in a sort of espionage side of things. In short, they are analyzing data, making notes on security systems, and its weakness then selling it or giving it to a third party who goes ahead and executes cyberattacks. Obviously, this method of crime could be intricate as it would most likely involve one or more people and so would be a fairly hard thing to solve. As for physical disruptors/perpetrators they could work in the company or work outside the company though I will focus on the workplace side of things. For these people they will try to disrupt the system or steal data by themselves. It is a bit easier to find these individuals. Though the damage they could cause could still be detrimental.

Leave a Reply

Your email address will not be published. Required fields are marked *