Adaptions to policy and infrastructure as rapidly changing as cyber technology is a premier challenge. Policy implies that rule making must occur and in our society that requires some amount of study, research, and consensus. Ultimately rulemaking in the United States is slow and bureaucratic, but for a reason. I do not think we will…
Journal Entry 12
Cyber technology is another domain in which criminals can access victims. Because a crime happens in the cyber domain instead of the physical domain does not necessarily impact severity. There have been incidents resulting in loss of human life because of a cyber-attack, but more commonly the cyber domain can be used to exploit someone…
Journal Entry 11
Criminal justice and cybercrime may be two different disciplines within a college, but they are not different in practice. Criminal justice is the implementation of consequence to criminals after they commit a crime. Cybercrime is just one of many crimes that our society has created consequence for. The criminal justice system is one of the…
Journal Entry 10
Engineers make cyber networks stronger by developing, evolving, applying, and enforcing best practices. More commonly known practices such as strong passwords as well as lesser-known practices or more complex methods such as intrusion detection and monitoring are all products of the cyber engineer. Integration of engineers whether in house or by paying for a service…
Journal Entry 9
Computers have certainly changed the world compared to when the world existed without computers. Among the ways they have made the world less safe are: In other ways computers have made our world considerably safer.
Journal Entry 8
Most people in the United States have a computer that they daily use and it is safe to say that everyone depends on computer functionality daily to live the kinds of lives we have become accustomed to as a society. Ensuring your computer is safe and in optimal working condition is a daily task, hopefully….
Journal Entry 7
In the 21st Century business large and small must consider cybersecurity. The smaller businesses face the largest knowledge and barrier to entry issues while the large businesses represent a larger attack surface and increased complexity. It is fair to say that regardless of the size of the business the risk remains the same. I successful…
Journal Entry 6
Cyber technology has created opportunities for workspace deviance in many ways both nefarious and most often non-nefarious. Ranging from misuse or inappropriate use to illegal employers or anyone providing access to IT tools and resources most now not only council and notify employees regarding the technology but also employ technical methods as preventing and enforcing…
Journal Entry 5
C= Courses. Education is the primary gap with improving cybersecurity. Courses targeting all age groups who use cyber tools that are scoped and tailored for the demographic. Y= Youth programs. Habitualize the practice of good cyber hygiene at a young age and integrate cybersecurity for youth like how sports are integrated. B= Bot integrations. There…
Journal Entry 4
I would like to compare cybersecurity in the United States and Canada. According to EU Cyber Direct in 2020 78% of Canadian companies were affected by a successful cyber-attack. Canada’s philosophy is that cyberspace is a free and open domain for human interaction and tools. Canada has joined with the EU in a rules-based approach…