Journal #7

Cyber technology impact interactions between offender and victims before or even after I security breach. Before a security breach occurs, measures are put in place to prevent people without the permission from accessing data and or information like credit card numbers, addresses, full names, or social security numbers. An example of this would be two-factor authentication. These helps allow users to access their information and denies users who don’t have the necessary clearance to access your information. This also falls under not just people’s information but business information and or remote control of machines. As for interactions after a breach I think the offenders have little to no interaction with a victim because again these crimes happen in most causes anonymously so the identification of the criminal will be hard from the get-go.  Those criminals will mostly lie or trick people into giving access or authorization to view or take sensitive information from the victim. Then once they get what they are after they will try and have their trace erased to make it hard to find them.
            I think we should approach cyber-policy with the perspective of someone not as knowledgeable with the dangers of technology. For example, and elderly person tends to be the prime target of fraud. So, criminals will most likely scam the elderly to giving them sensitive information such as their full name, address, and even credit card information. So, we have to either inform customers have tactics these criminals will use and make our policies in a way that can help the customers recover from attacks. I do believe that mistakes are made but we should not create policies for our own benefits but policies that protect the company and the customers because neither of the two can exist without the other. A lot of time an energy must be put into policies and security systems to ensure safety.

Leave a Reply

Your email address will not be published. Required fields are marked *