Journal Entry #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? To try to predict the future of where the cyber world is going you will end up spending more time taking care of possible issues than taking care of a actual issue. Using a day-to-day approach will make…

Journal Entry #12

How does cyber technology impact interactions between offenders and victims? Cyber technology creates a very easy route for ways to impact interactions between offenders and victims. Due to the fact that so much that goes into the internet deals with a combined amount of information, offenders use many methods to get involved into interactions with…

Journal Entry #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? The overlap between the criminal justice system and cyber crim is when the crime is found to have caused damage to information involving a person, business or group. When the divide between the…

Journal Entry #10

How do engineers make cyber networks safer? As I have worked through the years for many high end companies as an engineer, I have seen many methods to keeping cyber networks safer. When it comes to in house systems the companies will set up a network that will be in house only and keep most…

Journal Entry #9

Describe three ways that computers have made the world safer and less safe. Life has switched to a digital form when it comes to information. All information these days for the most part are stored on a computer. When you are switching information from paper to stored you come into problems and solutions for security….

Journal Entry #8

 How can you tell if your computer is safe? When looking at a personal computer and making sure it is safe there are many measures you must look at to verify this problem. Each computer will have the access to a personal program for antivirus and firewall but there are many other measures to look…

Journal Entry #7

What are the costs and benefits of developing cybersecurity programs in business? Starting out on the cybersecurity side of a business has many up front costs. The first thing a company would do is get an evaluation of their systems and processes to get an idea of what will be needed. When a cyber security…

Journal Entry #6

How has cyber technology created opportunities for workplace deviance? With the advancement of cybersecurity the creation of workplace deviance, the process of causing possible harm to a company from a worker in the company. The creation of spaces that are only available to certain employees, the creation or a possibility of an insider threat exists….

Journal Entry #5

legal ways to make money in cybersecurity.  Create Training CoursesYouTube informational channelBuild an applicationEnter a company’s cybersecurity team   Research and developmentSecurity auditingExplore freelance writingCybersecurity stock buyingUser support technicianRun independent companyIndependent consultingThreat response engineering consultant Youth Cybersecurity speaking events

Journal Entry #4

 Compare cybersecurity risks in the U.S. and another country. The United States has seen a huge increase of cyber attacks and the risk that stands out most would be from other countries, specifically Russia and China also known as Nation-State hackers. For the most part each country has a similar list of cybersecurity risks, though…