As much as I have spoken on the great innovations and connotations of cyber technology and its development, the world of cyber security is still a growing field and has much to be discovered by cybersecurity experts and analysts alike. A predicament many analysts have had is how we should approach development of cyber policy…
Author: jmort004
Journal #12: How does cyber technology impact interactions between offenders and victims?
As stated numerous times previously, criminals seem to have taken the internet as a safe place to commit their crimes with a sense of anonymity and more power. With the fact that criminals have more power online it leaves the notion that normal users have become more vulnerable which is important in understanding how criminal…
Journal #11: What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
In our current time period it seems that the overlap between criminal justice and cybercrime has become more apparent as cyber technology and the internet becomes more of a norm in our lives. Criminal activity and organizations have seemingly found the internet a safe haven for their offenses and as such the need for cooperation…
Journal #10: How do engineers make cyber networks safer?
As the technology and practices of cybersecurity move forward it becomes more and more apparent that the many fields of engineering seem to move forward at an equal rate. Engineers, whether they realize it or not, are supremely important to the improvement of cybersecurity infrastructure and consequently helped to make cyber networks safer, but how…
Journal #9: Describe three ways that computers have made the world safer and less safe.
Computers are undoubtedly one of the most important inventions in human history in that it has revolutionized the way our society develops and runs. Computers in themselves are important in their ability to make computing more efficient and with the addition of the internet in the 1990s revolutionized how work is conducted and how humans…
Journal #8 How can you tell if your computer is safe?
Growing up I had always been surrounded by computers and technology and had a lot of fun going to different websites, downloading & playing video games. During this time my parents had also warned me about the dangers of the internet and how to be safe when traversing it due to the many viruses and…
Journal #7: What are the costs and benefits of developing cybersecurity programs in business?
Business is the lifeblood of the American economy and as such could be the target of cyber criminals or foreign powers seeking to gain access and destroy data pivotal to the operation of these businesses. As cybertechnology becomes more and more integral to the way businesses operate it has helped highlight the potential risk posed…
Journal #6: How has cyber technology created opportunities for workplace deviance?
As said previously, cyber technology has made its way into our society and workplaces more and more which has created much discussion. Much of the discussion is amongst cybersecurity experts about the rising risk of cyber attacks on systems from foreign agents but also from within. Workplace deviance refers to the desire to cause harm…
Journal #5: Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.
This is my take on the journal assignment for this week; Cryptography usage in decryption and encryption. Youth programs for cybersecurity occupation information. Biometric readings software to further authorize identities. Engineer programs to prevent cyber attacks. Research frameworks and techniques for better protecting data. Secure servers housing organizational data. Execute frameworks to prevent cyber risks. …
Journal #4: Compare cybersecurity risks in the U.S. and another country.
Cyber offenses and crime is a worldwide issue and as such countries around the world are working just as hard as the United States to make strides in the field and protect their industrial and civic systems and data. As an American it is easy to understand the potential risks to American systems but how…