{"id":296,"date":"2024-06-21T18:35:31","date_gmt":"2024-06-21T18:35:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sprice2027\/?p=296"},"modified":"2024-06-21T18:35:31","modified_gmt":"2024-06-21T18:35:31","slug":"journal-6","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/sprice2027\/2024\/06\/21\/journal-6\/","title":{"rendered":"Journal #6"},"content":{"rendered":"\n<p>Engineers are very important to have to protect cyber networks because they save companies money, and they protect data that is stored on the networks from being hacked. One of the ways engineers make the network safe is by participating in a simulated cyber-attack to find vulnerabilities that a malicious may use to exploit the networks. The simulated attack evaluates the networks security protocols and a engineer uses the same tools and resources a hacker may use to find exploitable vulnerabilities this is called Penetration Testing. Another way is engineers work together with IT support specialists to solve any issues and find ways to help keep the computers and networks safe. Engineers also use their own resources to protect the networks from cyber criminals like firewalls to help block from attacking the network. They also use antivirus software to block from viruses like worms, trojans, and adware by using it to scan files and remove any malicious code that is detected. One of the overlaps between criminal justice and cybercrime is criminals that go on the dark web anonymously to steal people personal information gets jail time for going against the law if they get caught. Another overlap is education which if you get a degree in criminal justice, it&#8217;ll open more doors and make it easier for you to go into careers in cybersecurity that deal with the law. Technology plays a major impact on the overlap because it has a negative effect on our health and our behavior. Criminals try to steal personal information for their own gain which people describe cybercrime as a harmful behavior. This overlap relates to what we discussed in class because it all ties into how companies and people use different resources to protect from cybercrime. Like for example, different authentication methods are being used to make it harder for hackers to gain access to our accounts to prevent cybercrime.<\/p>\n\n\n\n<p>Sources:<\/p>\n\n\n\n<p><a href=\"https:\/\/cybertex.edu\/does-network-engineering-include-cybersecurity\/\">Does Network Engineering include Cybersecurity? &#8211; CyberTex<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/link.springer.com\/referenceworkentry\/10.1007\/978-3-319-78440-3_17\">The Dark Web as a Platform for Crime: An Exploration of Illicit Drug, Firearm, CSAM, and Cybercrime Markets | SpringerLink<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.salemu.edu\/degrees\/bachelor-criminal-justice-cybersecurity\/\">Bachelor&#8217;s Degree in Criminal Justice: Cybersecurity &#8211; Salem University<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s12103-018-9457-3\">Using Labeling Theory as a Guide to Examine the Patterns, Characteristics, and Sanctions Given to Cybercrimes | American Journal of Criminal Justice (springer.com)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Engineers are very important to have to protect cyber networks because they save companies money, and they protect data that is stored on the networks from being hacked. One of the ways engineers make the network safe is by participating in a simulated cyber-attack to find vulnerabilities that a malicious may use to exploit the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sprice2027\/2024\/06\/21\/journal-6\/\">Read More<\/a><\/div>\n","protected":false},"author":29096,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sprice2027\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sprice2027\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sprice2027\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sprice2027\/wp-json\/wp\/v2\/users\/29096"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sprice2027\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/sprice2027\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":297,"href":"https:\/\/sites.wp.odu.edu\/sprice2027\/wp-json\/wp\/v2\/posts\/296\/revisions\/297"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sprice2027\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sprice2027\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sprice2027\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}