Journal #13

When developing cyber-policy and infrastructure it is difficult to predict the direction that cyber technology will go. In this it is also difficult to predict the risks associated with that unknown. With these limitations in mind, the policies must be carefully put in place as to not become either unintentionally stifling or entirely obsolete. When…

Journal #12

Cyber technology has made it significantly more complicated in the interactions between offenders and victims. Cyber technology has allowed offenders to expand their operations anonymously. Before things like the internet, there was a lot more risk involved with being an offender. There was a risk of being identified or being caught in the act. This…

Journal #11

Criminal justice and cyber crime overlap almost completely. Criminal justice deals with the delivery of justice for crimes committed by people. Criminal justice is a system of institutions and conventions that allow for a fair set of punishments for crime. Cyber crime is a category of crimes. This is inherently overlapping with criminal justice just…

Journal #10

Engineers are part of the core development of cyber networks. Engineers help design these systems. At the design side of a cyber network, an engineer works to design the safety and security features of the systems. This allows the system to be properly put together and gives it the best chance of being secure. Engineers…

Journal #9

Computers have made the world so much safer in so many ways, but computers have also made the world more complicated and dangerous at the same time. One way computers have made the world safer is in manufacturing. Manufacturing has been a dangerous career path for centuries. Workers have been worked to death and mangled…

Journal #8

A computer is never truly safe. Even a computer completely isolated from any network can still be the victim of a physical attack. The only safe computer is a computer that is not able to turn on. A computer on a network is generally one of the most vulnerable computers. This computer could be remotely…

Journal #7

Developing a cybersecurity program as a business can be very costly or very cost-effective. There are a multitude of options as a business that can allow for maximum effectiveness and the most optimized cost options. Developing an in-house cybersecurity program is often not the best choice for businesses. For many small businesses it is just…

Journal #6

In many ways cyber technology has opened the door to deviance in the workplace. An employee has the whole internet at their hands with the introduction of cyber technology. There are simple deviances that an employee can participate in. Things like viewing unrelated content on the clock or browsing facebook can lead to huge losses…

Journal #5

Code cyber security software Yearly subscription based security software Business that sets up cyber solutions at a commercial levelEmergency response software ddos protection Replacing outdated security software at a commercial level Security consulting Employed at a cyber security firm Car computer system security software United States military cyber security divisions Response team for cyber events…

Journal #4

Cybersecurity risks in the United States are very similar to most other countries with the same developed infrastructure. The United States has a number of cybersecurity risks. At the government level, the United States has not demonstrated an ability to maintain the security of their systems. Several foreign governments and activist groups have been able…