Journal #7

The overlap between criminal justice and cybercrime is self-explanatory. Do we have crimes in the digital and virtual world? Yes. There are many different types of cyber crimes and laws are enforced for them. This is not something your typical local police department would likely deal with because of the non-local nature of internet criminals…

Journal #6

Engineers play a critical role in securing our networks. They implement and monitor security technologies and best practices and are our subject matter experts in cyber security. Engineers are studying and creating devices and applications for the ever growing and changing cyber environment. They identify vulnerabilities within organizations. They manage your cyber security program. They…

Journal #5

If your computer is off, it is most likely safe. Beyond that, there is no sure way to tell if it is safe or not. The best hacks are ones that go unnoticed. Certainly, through cryptography, you can reduce the likelihood of your information or communications of getting hacked but as evident in current events,…

Journal #4

Currently, almost all business in some way is conducted online. Businesses have an ethical and legal responsibility to ensure consumer, partner, and their own data is secure from cyber-attacks. Securing systems within an organization achieves many goals. It protects the confidentiality, integrity, and availability of information. Any weakness in these is bad for business. A…

Journal #3

The increase of cyber technology in the workplace can create opportunities for workplace deviance. Workplace deviance is described as the deliberate or intentional desire to cause harm to an organization, or individuals within that organization. A workplace will have varying types of technology available to an individual throughout the course of the day. They could…

Journal #2

Storing someone’s personal information is a very unique and important responsibility. There are some very important obligations one has when given this responsibility. Not only are you obligated to control the information exactly how the client wants you to, there are legal consequences in some cases when divulging personal information. Lets discuss some ethical issues…

Journal #1

Cybersecurity technology started to interest me in just the last few years. After a 20 career as a pilot, I transitioned out of the cockpit and started working in aviation operations. During that time, my company started to roll out what we called “EFB” or electronic flight bag. This had what used to be paper…