Technology and the cyber world and infrastructure is always changing. There is no such thing as being prepared and ready to defend any cyber crime that occurs; at least you cannot be fully prepared for every crime. Everyday there is new technology being made. Hackers are also developing new skills to try and make their…
Journal #13
In today’s world there have been many advancements with technology. These advancements have evolved, many advancements leading to crime. Crime used to occur face to face, but now in today’s society it can occur on the internet. Cyber criminals can do just as much damage as someone who is a criminal (not online). Crimes that…
Journal #11
Criminal justice and cyber crime are two very similar topics and majors. The study of criminal justice involves research methods for criminology, criminological theory, and the psychology behind criminal behavior. It is also the delivery of justice to those who have been accused of committing crimes. The criminal justice system is a series of government…
Journal #10
Cyber engineers do many things to help keep our networks safer. Cyber engineers create and detect networks. They are oftentimes called information security engineers because they identify threats, and vulnerabilities in systems and soft wares. Cyber engineers make networks safer because their main priority is to protect organizations from serious cyber threats and attacks. Any…
Journal #9
Any form of technology has its perks and its disadvantages. Using computers can be very beneficial in numerous ways because many corporations and businesses use it for privacy and security purposes. Although, there is always a risk when using computer technology because private information could be exposed. One way that computers have made the world…
Journal #8
There are several ways to check if your computer is safe and secure. There are also ways to prevent your computer from getting unwanted viruses or issues. The first step in ensuring your computer is safe is to think about what needs protecting. Most, if not all devices have built in security and protection. That…
Journal Entry #7
Developing and implementing anything related to cybersecurity or anything digital can be very difficult and expensive. There are many costs and benefits associated with this. A few benefits include securing important information, updated and advanced software and security, less chance of a cyber related attack and potential hacking, and many more benefits. The first example…
Journal #6
Deviance or the sociology of deviance explores the actions and/or behaviors that violate social norms across formally enacted rules as well as informal violations of social norms. Workplace deviance refers to deliberate, malicious attempts to sabotage an organization by causing problems in the workplace. Cyber technology can create opportunities for workplace deviance. Oftentimes, there is…
Free Write
Create app that rates software Yacht GPS software that is secure Being an independent consultant Expert instructor Respond, recover, from a ransomware or other cyber attack Security sales engineer Ethical hacker Cyber security stock purchases User verification wall creation Resolve security issues Individual coaching Training courses people can take Youth website creator
Journal #4
Cyber security risks may be different than ones that happen in the US. In an article I read about the Russians distorting information about how it is going in the Ukraine, instead of hacking or phishing, they took information given to them and completely twisted it. They are using the internet to give false information…