There is a specific approach that we should take when developing cyber-policies and infrastructure, despite the “short arm” of predictive knowledge. I believe this is one of the greatest advantages we have when developing a cyber policy. What I mean by that, is that the only way to account for the short arm of predictive…
Journal Entry #12
As much of a positive impact that cyber technology has on society, it has also opened an avenue for offenders to violate the rights of others. This avenue has become known as cybercrime. Offenders have found a way to use cyber technology to abuse the privilege of having access to the abundance of resources that…
Journal Entry #11
When it comes to criminal justice and cybercrime there are many overlapping similarities. So much so, that is makes sense that they go hand in hand. When one analyzes cybercrime, it is easy to point out the motives, train of thought and consequences that stem from the acts made by a cybercriminal. The motives that…
Journal Entry #10
In the age of cyber technology and data transfer, it is essential that the networks in which the data traverses and the technology that communicates on them, are especially secure. The more and more users that gain access to a network, require that more precautions are taken to secure that network. For this reason, engineers…
Journal Entry #9
Computers have been one of the best technological advancements that have ever been innovated. They have changed the very societal status quo that so many elders have become accustomed to. Computers have become integrated in all areas of our life but just like anything there are a series of cons to accompany the pros that…
Journal Entry #8
No fortress can be completely impenetrable, but measure can be taken to prevent vulnerabilities from being exploited. This is done by ensuring that all bases are covered to the best of one’s abilities when evaluating a system. To know if ones’ computer is safe, there are a series of steps and precautions one can take…
Journal Entry #7
In the digital age, data is everything. You can’t live without it and if so, you probably live in a log cabin out in the middle of the Grand Canyon. You would have to be that remote and out of touch, to not have a need for data. With there being so much data transmitted…
Journal Entry #6
Everyone has once heard the statement that if you give someone enough freedom in their actions that it may eventually lead to their own downfall. This is an old cliché paraphrased and adapted to fit modern contexts, but essentially this phrase explains that if irresponsible and unfit personnel gain the wrong access, privileges, and freedom…
Journal Entry #5
Create app that rates software.Yacht GPS software that is secureBachelor’s Degree in cybersecurityExamine the efficiency of a company’s cyber infrastructure by performing penetrations testingRent properties to companies to house their valuable assets in secure and safe access pointsSell you knowledge to companies in need of cybersecurity expertiseExecute routine backups for companies’ dataCertify yourself in specialty field in order…
Journal Entry #4
Cybersecurity is such a complex subject. To make a strong and efficient cybersecurity infrastructure, many factors must be accounted for. The best plans for securing cyber assets are plans that place the safety of clients and employee personnel at the forefront of the proposal. Next would be the company’s data, and lastly would be the…