HOW DOES CYBER TECHNOLOGY IMPACT INTERACTIONS BETWEEN OFFENDERS AND VICTIMS?

NIETO Eportfolio #11 Criminal Justice and cyber crime run in similar circles. Both include offenses that are committed by an offender with the only interchangeable constant being whether or not technology is being used, cybercrime is defined as a criminal activity that targets or uses a computer or a computer network. Thus it being a…

 HOW DO ENGINEERS MAKE CYBER NETWORKS SAFE?

NIETO Eportfolio #10 Given how technology has grown and involved since coming into fruition, it is amazing to see how it is being used and seen all around us. It has become a severe necessity in how the world operates and is structured today. Since this is a crucial necessity, and an every day tool,…

DESCRIBE THREE WAYS THAT COMPUTERS HAVE MADE THE WORLD SAFER AND LESS SAFE

NIETO Eportfolio #9 A vast majority of our lives revolve around technology, and every piece of technology has interacted with some form of a computer, one way or another. You can’t even go 10 feet today without interacting with something correlated to a computer. Computers have made the everyday life for humans a lot easier…

HOW CAN YOU TELL IF YOUR COMPUTER IS SAFE ?

 NIETO Eportfolio #8 “The moment you log onto the Internet, your CPU starts its own game of Russian roulette —“ (USA TODAY) that is crazy to think about while you are surfing, the web knowing that just one click, one tap, one wrong, move itself can cause unlimited damage.”— your personal data stored on the…

HOW HAS CYBER TECHNOLOGIES CREATED OPPORTUNITIES FOR WORKPLACE DEVIANCE?

Eportfolio #6 Workplace deviance can be defined as an unethical behavior that violates organizational norms about what is right and what is wrong. Today cyber technologies make it much easier to reach out to targets rather than being face-to-face with them directly. Not only does it make it easier for anybody to reach out or…

USE THE LETTERS OF THE WORD “CYBER SECURITY” TO LIST LEGAL WAYS TO MAKE MONEY IN CYBER SECURITY

Eportfolio Entry #5Create Apps that rates softwareYacht GPS software that is secureBlock attackers from accessing dataRent out software and equipmentSet up and monitor firewalls for companiesEnlist into the military taking up an IT/Cyber positionCreate a cybersecurity schoolUpdate equipment and software for companiesRespond to reported attacks and residents on callIntroduce new ways to combat cyber attacks…