How should be approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge? I think that all we can do given the “short arm” of predictive knowledge in relation to cyber-policy and infrastructure is by following something my dad likes to say often, “prepare for the worst and hope for the…
Journal #12
How does cyber technology impact interactions between offenders and victims? Cyber technology and its interaction between offenders and victims can be simply explained. The use of cyber technology has made it easier for an offender to harass a victim. One way that cyber technology has made it easier for the offender is that an offender…
Journal #11
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? There is a pretty decent overlap between criminal justice and cybercrime, especially considering that criminology (the study of crime and criminals and why criminals commit crime) is a required course if you want…
Journal #10
How do engineers make cyber networks safer? There is no perfect cyber network. Even the best networks with the most money and time put into them will have some sort of flaw that someone will eventually find and try to exploit. However, this does not mean that we should just ignore the need for a…
Journal #9
Describe three ways that computers have made the world safer and less safe. Computers are both a blessing and a curse. A marvel of technology, computers have allowed us access to essentially limitless data at the click of a mouse or even in the palm of our hand. With this great power however, comes great…
Journal #8
How can you tell if your computer is safe? To many of us, our computer is one of the most important things we own; It allows us to complete work at home, gather information, consume media, etc. It is also an important storage device that allows us to store important data, whether that just be…
Journal #7
What are the costs and benefits of developing cybersecurity programs in business? Cybersecurity is a massive field that continues to grow. It is one of the most important parts of any modern-day company and ensures that a companies data remains safe and protected. However, while cybersecurity is essential, many companies fail to implement proper cybersecurity…
Journal #6
How has cyber technology created opportunities for workplace deviance? Workplace deviance is typically defined as the intentional, malicious attempt to sabotage or damage an organization/company. Classic examples of workplace deviance include damage of physical equipment, stealing, and even just showing up late for work (on a consistent basis). These are all behaviors that can be…
Journal #5
Free write activity. Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity Code a program for a company to help evaluate basic cyber risksYouTube videos talking about a career in cybersecurity and teaching about it Becoming a CISO at a companyEvaluate a companies cyber security systemReverse engineering to…
Journal #4
Compare cybersecurity risks in the U.S. and another country The United States and China have a long and complex relationship that has ties to right after World War II. As these countries have close ties in many domains such as economy and technology, it would be interesting to see whether they have similar cybersecurity risks…