How does cyber technology impact interactions between offenders and victims? Cyber technology has a huge impact on interactions between offenders and victims because it makes it so much easier for offenders to victimize people. Offenders using cyber technology can stalk someone online without that person ever knowing. Cyber technology allows offenders to commit crimes anonymously…
ePortfolio #11
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? The overlap between criminal justice and cybercrime is victimization. Cybercrimes include embezzlement, fraud, bullying, denial of service, and unauthorized access. Cybercrimes have victims, and since they do, there is a need for criminal…
ePortfolio #9
Describe three ways that computers have made the world safer and less safe. Computers have made the world less safe because all of our personal information is stored on them. There is a greater chance for our information to be stolen by hackers since everything is readily accessible to be stolen. The U.S. Navy had…
ePortfolio #7
What are the costs and benefits of developing cybersecurity programs in business? The benefits for developing a cybersecurity program in business far outweigh the cost of the cybersecurity program. The cost that a business should look at when deciding on implementing a cybersecurity program is what it would cost them if they do not have…
ePortfolio #6
How has cyber technology created opportunities for workplace deviance? Cyber technology has created many opportunities for workplace deviance. Most cyber security incidents have human error as a contributing factor. Employees fall for phishing attacks, hit bad links, do not do computer updates, and use weak passwords, making it very easy for someone to attack a…
ePortfolio #5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Cryptanalyst You can train new cyber security professionals Banking Ethical hacker Recruit for a cybersecurity company System administrator Encryption engineer Chief information security officer Utility company cyber specialist Reverse engineering Invest in new cybersecurity technologies Teach cybersecurity at a…
ePortfolio #3
Describe four ethical issues that arise when storing electronic information about individuals. Ethical issues that arise when storing electronic information about individuals are privacy, confidentiality, security, integrity, and availability. Privacy and confidentiality can be a huge ethical issue when storing information about individuals. The amount of people that have access to personal information and if…
ePortfolio #2
Select four other majors offered by ODU and explain how those majors relate to cybersecurity. ODU offers other majors that relate to cyber security. One of the majors that relates to cybersecurity is Cyber Operations. Cyber Operations is an interdisciplinary major that covers the entire scope of cyberspace and operations that are ethical, legal, and…
ePortfolio #1
How does your major relate to cybersecurity technology? I’m a sophomore at ODU majoring in cybersecurity so my major directly relates to cybersecurity technology. Cybersecurity technology is used everywhere including the government, military, corporations, and the medical field. Cybersecurity technology is all encompassing and is evolving everyday as technology evolves. As technology grows, so does…