How does cyber technology impact interactions between offenders and victims? There are many ways cyber technology impacts interactions between offenders and victims. The most important is that due to cybercrime being on a device, of course, offenders and victims don’t realistically meet “face to face”. According to Marleen Kranenbarg, “In the case of cybercrime, there…
E-Portfolio #11
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? There are many overlaps between criminal justice and cybercrime. Cybercrime is an interdisciplinary study which means multiple other disciplines are formed into one. Cybercrime is a part of the criminal justice system. Criminal…
E-Portfolio #10
How do engineers make cyber networks safer? Engineers make cyber networks safe in many different ways. Engineers in the cyber world are literally the backbone of the network. These engineers are the ones keeping an eye out for any type of threats and or attacks that may occur towards the company or a specific work-related…
E-Portfolio #9
Describe three ways that computers have made the world safer and less safe Computers have both impacted the world in both positive and negative ways. To begin with, computers have seemed to impact the world safe in many different ways. Modern technological advancements are making us safer in different ways; there are many ways in…
E-Portfolio #8
How can you tell if your computer is safe? There is a number of ways to ensure your computer is safe. Maintaining the security of your computer helps you avoid malware and direct hacking attempts aimed at stealing your personal information. First and foremost, using a firewall is extremely important. A firewall is a form…
E-Portfolio #7
What are the costs and benefits of developing cybersecurity programs in business? Cybersecurity programs are extremely important in business. But developing cybersecurity programs for businesses is even more important. Building a cybersecurity program is not cheap by any means, although the money put into it will definitely break even. Developing a program as such can…
E-Portfolio #6
How has cyber technology created opportunities for workplace deviance? Cyber technology has created workplace deviance to occur more often in many different ways. Workplace deviance can be defined as, “described as the deliberate desire to cause harm to an organization – more specifically, a workplace.” As technology advances and more people intend to use in…
E-Portfolio #5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Create a program that allows encoding to occur when needed Yacht GPS software that is secure Biometric tooling to help detect interfering Extraordinary hacking detectors that reduce threats Reconstruct methods of preparation of attacks Securing data and information during…
E-Portfolio #4
Compare cybersecurity risks in the U.S. and another country. Cybersecurity risks are highly seen more often in the United States than in other countries. According to the University of Colorado Boulder, they state “The FBI has stated that US travelers are priority targets for cyber-attack and monitoring/surveillance.” The United States is not seen as the…
E-Portfolio #3
Describe four ethical issues that arise when storing electronic information about individuals When storing electronic information about information, there are four ethical issues that arise. Over the years it has become easier for an individual to store their information, the most popular being the cloud presented on the iPhone. The cloud downloads your information presented…