Prompt: How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Approaches to developing cyber policy and infrastructure seem daunting. To boot, predicting the future is impossible. Technological advances are happening at an exponential rate, so predicting every threat that could potentially arise will be like playing a…
Category: CYSE 200T
Trying to get all posts under 200T
November 29th, 2022 Entry 12
Prompt: How does cyber technology impact interactions between offenders and victims? Cyber technology has completely changed how offenders commit crimes and how people get victimized. The dawn of the digital age bred new crimes, but in some cases, certain crimes were merely moved online. For example, ransomware contains all the fundamental aspects of a ransom….
Eportfolio entry 11# November 15th, 2022
Prompt: What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Throughout this course, one overarching point that is continually referenced is how cybersecurity is an interdisciplinary effort. Criminal justice is a major part of cybersecurity and cybercrime, with policies and laws being…
November 8th eportfolio
Prompt: How do engineers make cyber networks safer? As previously documented, cyber security is a multidisciplinary effort, requiring skills from numerous fields to achieve cyber safety goals and objectives. Engineering plays a crucial role in cyber security, especially in physical security. With the advent of new smart technologies, every aspect of society has been made…
November 1st 2022 Entry 9#
Computers have made the world a safer place, from education to medicine, they have impacted all sects of society. Firstly, they have increased the efficiency of first responders and hospitals. Using computers, police can quickly pull up databases on potential suspects, giving them access to more information on potential criminals in a shorter time frame….
October 25th 2022 Journal Week 8th
Prompt: How can you tell if your computer is safe? Computer safety is of the utmost importance, because without it, livelihoods can be lost, reputations could be ruined, and identities stolen. There a few preventative ways to ensure that your computer is safe. Firstly, passwords used on the device and on the internet should be…
Journal 7th October 17th
Prompt: What are the costs and benefits of developing cybersecurity programs in business? There are numerous costs, as well as benefits, for developing cybersecurity programs in companies. Costs can be incurred in the initial stage of development, with employees being paid for planning and organizing resources. This stage may be costly, having to build policy and…
Journal #6 October 4th, 2022
PROMPT: How has cyber technology created opportunities for workplace deviance? Though there has always been mischief in the workplace, the dawn of the information age, the creation of modern computers, and advances in cyber technologies have provided more opportunities for workplace deviance. The definition of deviance is as follows, “the fact or state of departing…
September 27th 2022 Journal 5#
Prompt: Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Create new security policies for a local school.YouTube cyber security analyst, discover cyber threats on the platform. Building a stronger password policy for a law firmEncrypting data for a birthday clown federation. (I’m just trying to be funny,…
Journal 4# September 21st
Prompt: Compare cyber security risks in the U.S. and another country. Response: Cyber security practices, risks, and understanding differs across the globe. Some countries have relaxed policies regarding their data, whilst others take extreme, and sometimes overbearing measures to ensure no information leaks outside their borders. Nigeria is one of the more interesting countries to…