Journal Entry #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? It is known that cyber threats are constant and varying in severity. That said, we do not know what threats may or may not occur. As the “short arm” of predictive knowledge implies, our ability to predict and…

Journal Entry #12

How does cyber technology impact interactions between offenders and victims? The use of cyber technology allows for all sorts of cybercriminals to find their victims and carry out their attacks easily. From cyberbullies and cyberstalkers to hackers and scammers, the online world allows these individuals to remain mostly anonymous. It is challenging for them to…

Journal Entry #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Cybercrime has many definitions based on orientation or perspective; ranging from ethical orientation, harmful orientation, social constructionist perspective, deviance perspective, white-collar crime orientation, and workplace deviance orientation (Payne & Hadzhidimova, 2018). Criminal justice…

Journal Entry #10

How do engineers make cyber networks safer? As the foundation of cybersecurity, engineers are necessary for the protection of cyber networks using various techniques and tools. Their defense involves using encryption techniques to secure data transmission over various networks. By employing these encryption procedures, engineers ensure that data is encoded in a way that makes…

Journal Entry #9

Describe three ways that computers have made the world safer and less safe. Computers have made the world safer by enhancing security systems, improving emergency response, and providing smoother day-to-day operations. However, they have also made the world less safe through cyber attacks, lack of data privacy, and the potential misuse of artificial intelligence for…

Journal Entry #8

How can you tell if your computer is safe? In this day and age, technology is rapidly developing and evolving, with it, the risk of cyber threats and attacks. Computers cannot always be one hundred percent safe. Most individuals install protective measures such as antivirus protection, firewalls, strong passwords, consistently updated software, avoiding suspicious links,…

Journal Entry #7

What are the costs and benefits of developing cybersecurity programs in business? The purpose of cybersecurity programs is to provide individuals and organizations with a means to defend and protect themselves against malicious attacks or viruses that come their way. Businesses that want to develop and maintain strong cybersecurity measures have to invest in technology,…

Journal Entry #6

How has cyber technology created opportunities for workplace deviance? Cyber technology has opened doors to many opportunities in the cybersecurity workforce. Unfortunately, companies cannot always prevent issues such as workplace deviance. Workplace deviance can be defined as “any behavior from an employee that intentionally violates the rules or norms of an organization and results in…

Journal Entry #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.

Journal Entry #4

Compare cybersecurity risks in the U.S. and another country. Each country has different levels and types of cybersecurity risks and threats. The U.S. faces the threat of phishing, hackers, and third-party risks. Phishing is when an attacker disguises themselves as a notable company or person and emails an individual in order to get them to…