NIETO Eportfolio #12 Today as of 2023, cyber technology has been the fastest it’s ever been, the smartest it’s ever been, and more global than ever. Roughly 60% of the earth’s population has been on or is currently online which means we have all been connected one way or another thanks to the Internet.The Internet…
Author: cniet003
HOW DOES CYBER TECHNOLOGY IMPACT INTERACTIONS BETWEEN OFFENDERS AND VICTIMS?
NIETO Eportfolio #11 Criminal Justice and cyber crime run in similar circles. Both include offenses that are committed by an offender with the only interchangeable constant being whether or not technology is being used, cybercrime is defined as a criminal activity that targets or uses a computer or a computer network. Thus it being a…
HOW DO ENGINEERS MAKE CYBER NETWORKS SAFE?
NIETO Eportfolio #10 Given how technology has grown and involved since coming into fruition, it is amazing to see how it is being used and seen all around us. It has become a severe necessity in how the world operates and is structured today. Since this is a crucial necessity, and an every day tool,…
DESCRIBE THREE WAYS THAT COMPUTERS HAVE MADE THE WORLD SAFER AND LESS SAFE
NIETO Eportfolio #9 A vast majority of our lives revolve around technology, and every piece of technology has interacted with some form of a computer, one way or another. You can’t even go 10 feet today without interacting with something correlated to a computer. Computers have made the everyday life for humans a lot easier…
HOW CAN YOU TELL IF YOUR COMPUTER IS SAFE ?
NIETO Eportfolio #8 “The moment you log onto the Internet, your CPU starts its own game of Russian roulette —“ (USA TODAY) that is crazy to think about while you are surfing, the web knowing that just one click, one tap, one wrong, move itself can cause unlimited damage.”— your personal data stored on the…
WHAT ARE THE COSTS AND BENEFITS OF DEVELOPING CYBER SECURITY PROGRAMS IN BUSINESS?
NIETO Eportfolio #7 Cyber security is a very important pillar in the world today, especially with business today, depending more and more in technology and online systems. Since conversion into the online world, businesses have widen the reach to possible consumers in making it easier for all who can’t make it into physical stores and…
HOW HAS CYBER TECHNOLOGIES CREATED OPPORTUNITIES FOR WORKPLACE DEVIANCE?
Eportfolio #6 Workplace deviance can be defined as an unethical behavior that violates organizational norms about what is right and what is wrong. Today cyber technologies make it much easier to reach out to targets rather than being face-to-face with them directly. Not only does it make it easier for anybody to reach out or…
USE THE LETTERS OF THE WORD “CYBER SECURITY” TO LIST LEGAL WAYS TO MAKE MONEY IN CYBER SECURITY
Eportfolio Entry #5Create Apps that rates softwareYacht GPS software that is secureBlock attackers from accessing dataRent out software and equipmentSet up and monitor firewalls for companiesEnlist into the military taking up an IT/Cyber positionCreate a cybersecurity schoolUpdate equipment and software for companiesRespond to reported attacks and residents on callIntroduce new ways to combat cyber attacks…
COMPARE CYBER SECURITY RISKS IN THE U.S. COMPARED TO THE REST OF THE WORLD.
Eportfolio Entry #4 The United States of America has come a long way, not just as a country but also as an international Powerhouse in all categories. From the military to a strong and growing economy, to even sports, however we have also become a powerhouse in technology and especially cyber security. Due to all…
“DESCRIBE FOUR ETHICAL ISSUES THAT ARISE WHEN STORING ELECTRONIC INFORMATION ABOUT INDIVIDUALS.”
NIETO Eportfolio Entry #3 Two obvious key ethical issues that arise when storing electronic information about individuals are, of course, privacy, and confidentiality. I believe that these two pretty much always go hand-in-hand considering privacy is more centered around the people involved and who all has access or knows certain information. Meanwhile, confidentialities are more…