Given the short arm of predictive knowledge, the best approach to developing cyber-policy and infrastructure is to create a layered approach that focuses on prevention, detection, and response. Prevention should involve measures such as strong authentication, encryption, patching, and secure network configurations. Detection should involve measures such as logging and monitoring, vulnerability scanning, and intrusion…
Journal Entry #12
Security policies are a structured set of rules that only an agency may enforce to ensure that users who have access to a company’s knowledge sources and infrastructure comply with data security requirements and regulations. It is essential for businesses to have a cyber security policy, especially if they don’t employ people. Employees are now…
Journal Entry #11
There are certain links between criminal justice and cybercrime that are undeniable. Because a considerable proportion of crime is linked to technology, technology plays a vital part in criminality. You are breaching the law if you engage in cybercrime, and you will be held accountable via the criminal justice system. The fact that criminologists look…
Journal Entry #10
The construction of a safer cyber network requires engineers. Their contributions and innovations have had an effect on safety and privacy. PII can arise to privacy problems (personal identifiable information). Access to PII is open to both authorized and unauthorized people. Unauthorized access to PII can cause issues that are generally recognized. These include embarrassment…
Journal Entry #9
Three ways that computers have made the world safer: The effect of computers on schooling institutions is evident. Users can now obtain knowledge more easily due to it. Users can browse online videos, audio, books, and photos. People can fully benefit from and immerse themselves in knowledge due to the abundance of information available on…
Journal Entry #7
The development of cybersecurity programs in businesses is crucial today. The National Small Business Association, better known as NSBA, discovered in its 2014 Year-End Economic Report that “half of all small businesses indicate they have been the target of a cyber-attack – up from 44% just two years ago” (The Impact of Cybercrime on Small…
Journal entry #6
Technology can help workplace deviance in two ways: by making it simpler to engage in the activity (for example, through information technology that offers more anonymity) and by making it simpler to conceal the behavior (e.g., through digital surveillance). Stealing trade secrets, disclosing private information, and posting content on social media that is against business…
Journal Entry #5
Create app that rates software. Yacht GPS software that is secure Business Continuity Plan Consultancy Enterprise Resource Planning (ERP) systems developer Risk Management Consultancy Security Controls Deployment (installation of network security controls) Enterprise Risk Management Consultancy Conduct of Cyber Security Awareness Training Universal Network Intrusion Detection System for organizations Resource Monitory system for network devices Internet of Things…
Journal Entry #4
There are a number of differences between the cybersecurity risks faced by the United States and other countries. According to Cybersecurity Ventures, global spending on cybersecurity will reach $1 trillion by 2021, with the United States accounting for almost a third of this amount. This is one significant difference. Since there has been such a…
Journal Entry #3
Several concerns come to mind when considering a wide topic like ethical concerns while preserving electronic information about people such as: privacy, accuracy, property, and accessibility.There is an issue about how a person’s data is being stored as it becomes easier to store our information using various developments like storage devices. Information permeates, and improperly…