Q: Explain how the principles of science relate to cybersecurity. There are eight different principles of science that relate to the research of cybersecurity and explain how it’s currently evolving and changing every day: Relativism, Objectivity, Empiricism, Parsimony, Ethical Neutrality, Determinism. Relativism describes all of the different relationships between cybersecurity and the other systems around…
CYSE 201S-Journal Entry #1
Q: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. A: According to the NICE Workforce Framework, there are seven main categories that is included in the cybersecurity workforce: Analyze, Collect…
CYSE 200T-ePortfolio entry #13
Q: How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? A: As described in a journal article by philosopher Hans Jonas (1973), “The short arm of human power did not call for a long arm of predictive knowledge”, referring to how humans make decisions for certain actions…
CYSE 200T-ePortfolio entry #12
Q: How does cyber technology impact interactions between offenders and victims? A: Technology has granted us the ability to do a plethora of tasks that would be impossible otherwise, such as storing thousands of files in a centralized location, communicating instantly with someone miles away, and generally continuing to make our lives much easier. However,…
CYSE 200T-ePortfolio entry #11
Q. What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? A: Before answering this question, there’s an important distinction to be made between criminal justice and what is known as criminology. Criminology focuses more on the “scientific study of crime” and why…
CYSE 200T-ePortfolio entry #10
Q: How do engineers make cyber networks safer? A: While seemingly very narrow upon it’s first glance, cybersecurity as a whole is a very interdisciplinary field of study, with lots of different fields working together in order to make computer systems and networks safer. One of the biggest contributors to cybersecurity and its development actually…
CYSE 200T-ePortfolio entry #9
Q: Describe three ways that computers have made the world safer and less safe A: One of the most impressive inventions that the human race has created is the power of computers. In many different ways, computers have vastly helped the world and continue to be a sign of a bright future of development and…
CYSE 200T-ePortfolio entry #8
Q: How can you tell if your computer is safe? A: Most people would agree that cybersecurity has grown to be an incredibly important aspect of business and companies; however, when it comes to users own personal devices, security may seem more like an afterthought. In reality, even personal security is extremely important, as there’s…
CYSE 200T-ePortfolio entry #7
Q: What are the costs and benefits of developing cybersecurity programs in business? A: In a world where technology is used everywhere, it appears difficult for businesses, both small and large, to integrate cyber security in the business, especially when issues arise with the allocation of resources and money. Especially for smaller businesses, without some…
CYSE 200T-ePortfolio entry #6
Q: How has cyber technology created opportunities for workplace deviance? In our current, modern age, many businesses have adopted technology into our everyday work life, whether its computers used to perform all of our tasks and assignments or having servers to host specific databases and programs. Everyone from customers, the leaders who uphold a business/organization,…
CYSE 200T-ePortfolio entry #5
Q: Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity: Create a cybersecurity firm. Yahoo! Network Security Engineer. Bug fixing for an online website. Ethical hacking an organization, to identify vulnerabilities. Risk assessment in a business. Securing an information system. Encrypting FTP servers. Creation of a VPN software….
CYSE 200T-ePortfolio entry #4
Q: Compare cybersecurity risks in the U.S. and another country. A: Cybersecurity threats and risks continue to grow and threaten users of technology as time goes on, especially in our country of the United States; however, it’s also important to note that cybersecurity risks can also affect anyone from around that world. In fact, even…
CYSE 200T-ePortfolio entry #3
Q. Describe four ethical issues that arise when storing electronic information about individuals. A. With how advanced technology has grown, it’s no surprise how easy storing information has grown over the years of individuals either by themselves or through organizations. However, there are many dangers that can arise from this. For example, storing information through…