Entry #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? The development of cyber policy and infrastructure is a task where you consolidate many different important ideas in regards to how you think cyber networks should function and implement them on the networks. It establishes a baseline and…

Entry #10

How do engineers make cyber networks safer? Cyber networks are always having the risk of hackers exploiting their system. For this reason, it is critical for the system to always improve. Additionally, cyber networks can be disrupted either by natural disasters or malicious online attacks which increases the urgency for engineers to keep these networks…

Entry #12

How does cyber technology impact interactions between offenders and victims? The development of technology coincides with the presence of crime on the internet, increasing incidents and cases of hate daily. This means that cybertechnology has made it easier for cyber offenders to seek out their cyber victims online. The crimes primarily seen online includes cyber…

Entry #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Criminal justice deals with the discovery, processing, and execution of a crime committed by anyone. The people involved in the process of traditional criminal justice includes detectives (FBI or police), lawyers, and judges….

Entry #9

Describe three ways that computers have made the world safer and less safe. Having computers and the internet has opened doors for us to interact with each other on a macro and global level. We are more aware of different cultures and topics through online forums, social media, and websites. Furthermore, we have created a…

Entry #8

How can you tell if your computer is safe? The thought of having someone listening or watching you from your computer or phone is often something scary to think about. In order to know if someone’s computer is safe to use, there are certain things to keep an eye out for. The first thing to…

Entry #7

What are the costs and benefits of developing cybersecurity programs in business? According to an article published last year regarding cybersecurity budget, a study estimates that the average cost of data breaches for small businesses can range form $120,000 to $1.24 million. IBM’s 2019 Cost of a Data Breach Report further estimates that the average…

Entry #6

How has cyber technology created opportunities for workplace deviance? Workplace deviance happens when an employee who is unhappy at their workplace tries to find a way to harm the company. They hold a grudge either from bad treatment or a release notice from the company. Some of the behavior they portray can be minimal like…

Entry #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  Cybercrime investigator can help solve crimes committed online as a career. Yacht with safe software that can track wind, wave, and weather currents with built in GPS tracking system. Bootcamp for cybersecurity to help students gain proper exposure to…

Entry #4

 Compare cybersecurity risks in the U.S. and another country. When comparing the cybersecurity risks between different countries, measures of evaluation for these countries vary. Usually, we look at certain a criteria to help us rank the cyber safety of these countries. We look at infection rates, attack rates, defense systems, legislation, public awareness, and international…