Many businesses all over the world use technology and the internet as a huge part of their company. They can use it to store private information of the company, it can be a way to sell products to customers, or it can be a way that the employees communicate with one another. This is not…
Journal #12
When it comes to cyber interactions between offenders and victims, there are many ways where there could be interactions between the two. One of the most popular used tactics used by offenders is using the cyber world to interact and communicate with underaged victims. The cyber world in this case would definitely impact interactions between…
Journal #11
Cyber crime is criminal activities that occur within the cyber world. Criminal justice is the delivery of justice for those who have committed any type of crime. With cybercrime and criminal justice, there are many similarities and there is an overlap between the two. Individuals that work within the cyber security world, are technically considered…
Journal #10
Cyber engineers use electrical engineering and computer science to protect and monitor everything that occurs within the cyber world. Engineers play a huge role in making cyber security networks safer. Engineers that create these networks are always finding ways to improve them and to make them as safe as possible. They create new and improved…
Journal #9
The world is increasingly becoming more technologically advanced, meaning there are many individuals that use technology everyday. One of the most used pieces of technology is the computer and there is a large percentage of individuals that use it all over the world. The computer has made the world a safer place in many ways,…
Journal #8
Many people around the world own computers and laptops. When it comes to individuals knowing if their computer is safe, most of the time they do not know. The first step is knowing if the computer is infected with a virus, and there are a few ways to tell. The first way to tell would…
Journal #7
When owning a business, it is highly important to have a secure cyber security set up. The private information that makes up the business needs to be maintained within the company. Having a secure set up can prevent unauthorized users from gaining access to sensitive information. Having a cyber security program in a business can…
Journal #6
Workplace deviance is the desire to cause harm to an organization, more specifically a workplace. When workplace deviance happens within a cyber security setting, it is harder to detect as it most likely would take place online. If an employee felt the desire to cause harm to a cyber security/technology business, a way to do…
Journal #5
Create cyber security training courses to teach individuals everything there is to know about cyber security YouTube account that has videos that teaches college students the basics on cyber security Boot camp for individuals that want to get into cyber security Ethical hacking, or known as “penetration testing” Render information on the amount of vulnerabilities…
Journal #4
With the world becoming more and more technologically advanced, anyone with a device can deal with the cyber security risks that are involved when it comes to putting information online. It is an ever growing process and is becoming harder to deal with. In the United States, a majority of people with stable incomes, have…