How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Today, the decisions made for the development of policies and infrastructure related to cybertechnology have the potential to significantly alter the future outlook of society. In order to determine the approach with which we continue to develop cyber-policy…
Journal #12
How does cyber technology impact interactions between offenders and victims? The anonymity provided by cyber technology gives offenders a sense of security and freedom to harass others on the internet, any time, anywhere, and without fear of repercussion or retaliation from the victim. Many times, an individual can be harassed for a long period of…
Journal #11
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? The life-changing technological innovations manifested in the digital age have ushered in new methods of conducting illegal activities. As a result, technology has become a vector for crime—more specifically, cybercrime. The prefix “cyber”…
Journal #10
How do engineers make cyber networks safer? Much of the safety found in cyber networks is thanks to the work done by systems security engineers, which is a specialty discipline of systems engineering. Systems security engineering establishes the appropriate security principles, concepts, methods, and practices to be applied during the system life cycle to achieve…
Journal #9
Describe three ways that computers have made the world safer and less safe. Computers have made the world safer, but they have also made it less safe. When it comes to protecting personally identifiable information (PII), computer technology allows for much stronger data protection compared to the less sophisticated methods of security. For example, an…
Journal #8
How can you tell if your computer is safe? Computers are never 100% safe, but there are many ways to tell that they are safe enough to use. The very first thing a person should look for is proper authentication. Whether it is a password, 4-digit PIN, multi-factor authentication (MFA), fingerprint or another biometric method,…
Journal #7
What are the costs and benefits of developing cybersecurity programs in business? Costs for a cybersecurity program vary across all industries. Costs may be determined by risk management processes, the size/type of the company, the data that is accessed by employees, and the types of virus protection software. When developing a cybersecurity program, companies should…
Journal #6
How has cyber technology created opportunities for workplace deviance? Cyber technology has opened the door to many acts of workplace deviance. The availability of company data on workplace computers creates opportunities for valuable information to be stolen, manipulated, or destroyed. For example, a disgruntled employee working in IT is on his way out of the…
Journal #5
Legal ways to make money in CYBERSECURITY: Create a cybersecurity blog Yamaha AV equipment security assurance against vulnerabilities Bug bounties Educate students on cybersecurity at a university Run a cybersecurity consulting firm Sell cybersecurity products or services to companies Ensure application security for an app developer Carry out security audits Undertake freelance work as a…
Journal #4
Compare cybersecurity risks in the U.S. and another country. The U.S. is considered a “non-serious cyber crime country.” The crimes committed here are less volatile—mostly involving digital piracy and harmless spam mail. However, digital piracy is an ever-growing cyber crime throughout the country. Along with other wealthy nations (GDP-wise) such as Canada, China, and Japan,…