Cyber-policy and infrastructure development in the context of the “short arm” of predictive knowledge presents a unique dilemma. Decision-makers must evaluate both the rapid advancement of technology and the unpredictability threats that may appear as a result (LEWIN & SPIDALIERI, 2023). Being proactive, adaptive, and flexible in one’s approach is required. Also, being aware of…
Journal #12
Cyber Technology has significantly impacted how offenders and victims interact. Being that we are living in a technology driven society. Criminals are constantly trying to find different ways to to deceive people. Most of the time, people who commit internet crimes are typically after some sort of financial gain. Some people don’t even acknowledge that…
Journal #11
Criminal Justice and Cyber crime have major connections to one another. There is a lot of crime that takes place on internet. Some of the crime that we see on the internet include things like Phishing, cyber pornography, ransomware and malware attacks. If someone is found to have committed one of these crimes, they will…
Journal #10
In a time where technology is on the rise, the need for professionals who are experts in network security are needed more than ever now. According to an article published by Maryville University, “A network security Engineer protects systems from cyber threats, including bugs, malware, and hacking attempts.” These professionals are able to identify issues…
Journal #9
We live in a society where Computers have changed the world drastically. There are lot’s of ways that people benefit from having one. However, computers do come with dangers as well. It is important that we discuss the benefits as well as the disadvantages that come along with computers. This way, people can safely operate…
Journal #8
A person’s computer being safe depends solely on the person who owns the computer. There are various ways to ensure security of your device. One of the main things a person will need to make sure their computer is safe is to have a strong password. The password should include uppercase and lowercase letters, numbers,…
Journal #7
Some businesses today lack Cyber Security within their organization, which in return leads to hackers being able to successfully compromise sensitive information which could cost an organization money, clientele, and sometimes the business itself depending on the seriousness of the hack. Being that new technology is constantly being developed and cyber criminals are continuing to…
Journal #6
When it comes to Cyber Security, Deviance is defined as “inappropriate or criminal behavior in a digital context.” Workplace deviance is when an employee intentionally causes harm to a company or organization that they are a part of. According to an article written by Jeremiah Talamantes, “people internal to an organization are a frequent cause…
Journal #5
Using the word CyberSecurity… list legal ways to make money in Cybersecurity Create online cybersecurity courses You can buy stocks in Cybersecurity Become a Cybersecurity freelancer Ethical hacking (detect vulnerabilities within an application) Regularly perform risk assessments for companies Start your own Cybersecurity business Engineering Creating contingency plans for companies after successful attacks Update cybersecurity…
Journal #4
One of the countries that has an increased Cybersecurity risk is Honduras. Honduras lacks a proper framework. As discussed in previous modules, a cybersecurity framework is a set of rules that is important when it comes to protecting organizations or agencies against threats and helps identify weaknesses and vulnerabilities within an infrastructure. According to Shweta…