Publication #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?  The development of Cyber-policy and –infrastructure is something we must address, especially in these times of changes, where technology is moving faster than ever. There are 2 approaches, and both have pros and cons. First, if we develop…

Publication #12

How does cyber technology impact interactions between offenders and victims?  With the arrival of the internet, crimes evolved and increased exponentially, and so is the way these crimes are prosecuted. Offenders have broadened their reach thanks to the platforms of social media and messaging apps, they can communicate with people around the world without physically…

Publication #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? The criminal justice system is the one that enforces the law and what is considered a crime and the degree of the punishment, and it relates to cybercrime in the sense that a…

Publication #10

How do engineers make cyber networks safer?  System security engineers’ main goal is to protect the stakeholders and system assets. This is achieved by deploying tasks in the system life cycle processes with the goal of reducing of terminating vulnerabilities and minimizing the impact of exploiting or triggering those vulnerabilities. Engineers reduce the susceptibility of…

Publication #9

Computers have made the world safer and less safe. First beginning with how computers have made the world safer, with computers we have made air transportation safer, before computers we did not have ways to track the weather or track other airplanes, the navigation system was maps and a compass and looking for landmarks. Nowadays, we…

Publication #8

How can you tell if your computer is safe?  The first thing when purchasing a computer is to create a strong password, it does not have to be long, but a combination of numbers, letters, a capital letter, and symbol to be complex. After, to have extra precautions it is always recommended to encrypt the…

Publication #7

What are the costs and benefits of developing cybersecurity programs in business?   The biggest benefit is the survival of the business or company because if a breach were to occur a lot of domino effect events would happen. Starting with the data stolen, it could be from personal information of customers, employees, or other companies…

Publication #6

Cyber technology has opened more opportunities for employees to do damage to their companies undetected by simply using their computer and access. Workplace deviance occurs in many ways, and everyone has their own objective. At the end all this affects the company and customers. This is the other side of cybercrime, and they called it…

Publication #5

Cybersecurity analyst  Youtuber blogger or influencer   Bug bounty hunter  Ethical hackers get rewards by attacking legally their systems.  Recommendation for improvement after auditing a system  Security consultant  Educating by becoming a cybersecurity teacher.  Creating security tools  Updating new security systems  Research in projects   Identifying vulnerabilities in systems   Testing networks or systems for…

Publication #4

Today’s Cybersecurity challenges are becoming every time more challenging. In United states we are experience an enormous number of spams that can be harmful and nuisance. Most of the spam is sent from a type of malware called “Botnet” that counts for 76% of the spam sent globally. The top countries to host botnets are…