CYSE-200T: Journal Entry #12

The relationship and interactions between offenders and victims have drastically changed due to the invention of cyber technology. Due to the nature of the cyber world, a cybercriminal can victimize anyone from anywhere. A criminal can be sitting on their couch and steal money from someone thousands of miles away! The internet has given criminals…

CYSE-200T: Journal Entry #11

The criminal justice system applies to cybercrime just as it does any other crime. There are laws and statutes in place governing cyber behaviors just as there are for behaviors in life. Just like in the physical world, fraud, stalking, harassment, theft, and other malicious activities are often illegal. It might take a slightly different…

CYSE-200T: Journal Entry #10

Engineers have many tools at their disposal to make cyber networks safer. Many of these tools come in the form of software. Regularly updating software either manually or using systems such as application program interface (API) will help ensure a much safer cyber network. This will help provide safety against known vulnerabilities within the network…

CYSE-200T: Journal Entry #9

There are many different types of computers that give us different types of benefits. Supercomputers are the biggest and most complex of these with the largest amount of computing power. They allow us to do things like predict the weather, develop vaccines and medicines, create complex engineering models that can create the safest vehicles and…

CYSE-200T: Journal Entry #8

There are many things you can do to make sure your computer is safe. These include preventative measures, monitoring, and a plan when an incident occurs. Some preventative measures include firewalls (hardware and software), antivirus software that blocks intrusions, consistently and expeditiously updating and patching software when there are new versions, and using encryption methods…

CYSE 200T: Journal Entry #7

Cybersecurity programs are essential to businesses. Small and big businesses alike can be targeted by cybercriminals, and no company is truly safe. Even with the best cybersecurity practices, no security program can 100% guarantee to be effective against cybercriminal activity, but there are methods that can help reduce vulnerabilities within the company and therefore reduce…

Journal Entry #6: How to Spot a Fake Website

There are several things to look for when trying to identify if a website is a fake website or a true website that can be trusted. One thing to look for is the domain name. Does the domain actually say what it should, for example, google.com or maybe it is something similar like g00gle.com? A…

CYSE 200T: Journal Entry #6

The rise and advancement of cyber technology have created many more opportunities for workplace deviance for those who are inclined to do so for whatever their reasons may be. Motivations may be financial, political, or personal, but technology has made it much easier to perform these devious acts. First, the internet contains a plethora of…

CYSE 200T: Journal Entry #5

Legal ways to make money in cybersecurity: Consult on cybersecurity problems within a businessYou-tube cybersecurity influencerBuild a cybersecurity program for a companyEvaluate a network for vulnerabilitiesRecover data lost in a breachSecurity breach patchingEngineer a new cybersecurity software programCreate a cybersecurity game used for trainingUpdate existing cybersecurity enterprise networksRisk management assessmentsIT program auditingTest programs for problems/vulnerabilitiesYouth…

CYSE 200T: Journal Entry #4

The United States faces many cybersecurity risks, and those risks are increasing daily. Any attack is possible, but some are more likely to occur than others. According to the U.S. Government Accountability Office (n.d.), one of the biggest risks that cost the most money is through emails, specifically business emails. Risky emails in businesses can…