CYSE-200T: Journal Entry #13

How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge? Cyber policy and infrastructure are lacking, especially cyber policy. There are a lot of bad people out there who can get away because of how easily they can disappear without a trace. One minute you are talking to…

CYSE-200T: Journal Entry #12

How does cyber technology impact interactions between offenders and victims? Cyber technology can impact interactions between victims and offenders in many ways. One way is that it can create a safer space for the victim. If the victim is on the right website with the right defenses, they wouldn’t have to worry about any attackers….

CYSE-200T: Journal Entry #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Many things are different about criminal justice and cybercrime, and there are also a lot of similarities between the two. Before I talk about the similarities, I want to explain a little bit…

CYSE-200T: Journal Entry #10

How do engineers make cyber networks safer? Cyber networks exist for many reasons; for one, they help connect people. Second, they make it easy for people to send data and information between themselves a lot quicker and easier. Lastly, cyber networks also give people the ability to learn from the accessibility of information. While cyber…

CYSE-200T: Journal Entry #9

Describe three ways that computers have made the world safer and less safe. Computers have been very helpful for many reasons, but at the same time, it has also created new problems. The world is safer because of the accessibility of information. Because of the internet, people are able to access information that they would…

CYSE-200T: Journal Entry #8

How can you tell if your computer is safe? There are a lot of ways that people can get into our computers and potentially harm our data; most of them go in quietly and get out without being noticed. The only ways that they would normally be noticed are if it affected any programs that…

CYSE-200T: Journal Entry #7

What are the costs and benefits of developing cybersecurity programs in business? Cybersecurity programs can be very vital and bad to businesses. For most businesses, especially the ones that operate online, having a cyber defense is very important. First, they can help stop attackers trying to steal data from the company. It would be very…

CYSE-200T: Journal Entry #6

How has cyber technology created opportunities for workplace deviance? Cyber technology can be very helpful, and it can create a sense of justice in people. This sense of justice can be very good because that person will want to keep going and help out more people. While some people like to help others, there are…

CYSE-200T: Journal Entry #5

Cybersecurity Company serverYouth cybersecurity teacherBank cybersecurity advisorEducating others on cybersecurityRestoring compromised networks.Software developingEngineering server securityCryptographerUsing what you know to create antivirus applications for people to buy.Raiding company networks, with their permission, to help find weaknesses.Information security specialistTesting servers to see how secure they areYahoo cybersecurity specialist

CYSE-200T: Journal Entry #4

Compare cybersecurity risks in the U.S. and another country. The US can be considered one of the most powerful cyber countries on earth. With the amount of effort that the US put into becoming a strong force to stand against enemies on the battlefield, the US also needed to put some effort into defending its…