Journal # 6

     Engineers make cyber networks safer by constantly creating, researching, and analyzing every network that is available to them. You would think, since the network built that everything is done, but that doesn’t mean that the task is complete. One phase of this process is the protection of the network, cybercriminals are always looking to find some sort of access into a network with malware or viruses and it’s the job of the engineer to see how that affects the network and come up with a defense for it. After a certain amount of time networks become vulnerable or obsolete, so engineers are always working on creating new networks to replace the ones that have been deemed less secure than the new one. Engineers are the human factor of the anti-virus that we buy to protect our devices that are connected to the internet. Engineers also work in a collaborating capacity with others because there are more criminals out there than engineers so its best to sometimes share information to counterattack what hackers are trying to do.

     The overlap between criminal justice and cybercrime through the years of internet conception have not been defined clearly. Government officials along with society have all been victims of cybercrimes and because the laws are not specific, we will continue to have problems when it comes to this crime. We have come to a fork in the road and it’s time for us to take a stand. Since the internet is intertwined in everything, we do in our life today, how can law makers struggle to clarify laws to protect honest law-abiding citizens that they took an oath to protect. The most common cybercrime that is talked about is identity theft. This is a crime that people commit knowing that it’s a crime and victims suffer the repercussion and if caught there is no law to hold them accountable. Currently we treat cybercrimes with low probability, and this is a problem that is affecting societies around the world. Some crimes are so hideous, I can’t believe that governments can’t come together and find a common solution to this problem.  

Leave a Reply

Your email address will not be published. Required fields are marked *