Because the cyber world is ever evolving, we don’t have the ability to predict the future of it; we can only take the short-sighted approach of what will happen. Doing this can ensure that policies can be easily adapted to what ever is happening in the world at that time. Given this, it’s crucial to…
Journal #12: How does cyber technology impact interactions between offenders and victims?
Cybertechnology has bridged the gap for interactions between offenders and victims in many ways. There has never been an easier time, in history, where someone can hide their identity online. The increased possibility of anonymity has allowed offenders to hide behind a screen and mask their intentions. This has made it easier to manipulate and…
Journal #11: What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
When discussing the overlap between criminal justice and cybercrime the similarities are very apparent. Both are used in conjunction of each other and are directly related when combating digital offenses. Criminal justice relies on studying criminals, legal systems and law enforcement while cyber security focuses on the prevention and response of cybercrimes. Due to the…
Journal #10: How do engineers make cyber networks safer?
Engineers play major roles in securing cyber networks through implementing certain measures and mechanisms. Engineers help create and implement means of authentication like biometrics, two-factor authentication, and multifactor authentication to aid in the prevention of unauthorized access to data. With the usage of fortified security measures, cyberattacks and breaches are drastically reduced. They also assist…
Journal #9: Describe three ways that computers have made the world safer and less safe.
The introduction of computers and internet has drastically changed the landscape of the entire planet. At this point, they are so integrated into society that even the most basic things in our lives wouldn’t function without a computer. When talking about safety, computers have their pros and cons; let’s touch on a few of them….
Journal #8: How can you tell if your computer is safe?
Hackers and malicious entities are very tricky in the cyber landscape. They can avoid detection for a long time and sometimes altogether. Therefore, it isn’t always possible to know if your computer is 100% safe. However, there are many steps one can take to ensure the best possible security for devices. The first step anyone…
Journal #7: What are the costs and benefits of developing cybersecurity programs in business?
The implementation of cybersecurity programs should be a top priority for anyone who wants to start and maintain a major business. However, as all businesses do, it comes with its costs albeit major benefits. For some of the cost you would first have to budget your initial investment. This would include investments in technology, infrastructure,…
Journal #6: How has cyber technology created opportunities for workplace deviance?
Through the advancement and expansion of cyber technology, many opportunities for workplace deviance have been created. Never has it been easier to access information online, and when you have the credentials to access other people’s data, the possibilities for deviance become endless. The first example of workplace deviance we will touch on, is Data theft….
Journal #5: Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity
Create an anti-virus software Yearly company training Blockchain Security Ethical hacking consultant Recruitment services Security inspector Educational Product distribution Cybersecurity software development Unauthorized access detection Recruitment services Internet of Things security Talent recruitment Yacht security services
Journal #4: Compare cybersecurity risks in the U.S. and another country.
The United States is ranked among the highest in its commitment to Cybersecurity. We essentially lead the world in Cybersecurity application and development and have aided some of our geopolitical allies in the advancement of their own cybersecurity. However, one major ally that has been finding itself inadequately equipped is Japan. Japan is the main…