Journal #11: What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

When discussing the overlap between criminal justice and cybercrime the similarities are very apparent. Both are used in conjunction of each other and are directly related when combating digital offenses. Criminal justice relies on studying criminals, legal systems and law enforcement while cyber security focuses on the prevention and response of cybercrimes. Due to the…

Journal #10: How do engineers make cyber networks safer?

Engineers play major roles in securing cyber networks through implementing certain measures and mechanisms. Engineers help create and implement means of authentication like biometrics, two-factor authentication, and multifactor authentication to aid in the prevention of unauthorized access to data. With the usage of fortified security measures, cyberattacks and breaches are drastically reduced. They also assist…

Journal #8: How can you tell if your computer is safe?

Hackers and malicious entities are very tricky in the cyber landscape. They can avoid detection for a long time and sometimes altogether. Therefore, it isn’t always possible to know if your computer is 100% safe. However, there are many steps one can take to ensure the best possible security for devices. The first step anyone…

Journal #6: How has cyber technology created opportunities for workplace deviance?

 Through the advancement and expansion of cyber technology, many opportunities for workplace deviance have been created. Never has it been easier to access information online, and when you have the credentials to access other people’s data, the possibilities for deviance become endless. The first example of workplace deviance we will touch on, is Data theft….

Journal #4: Compare cybersecurity risks in the U.S. and another country.

The United States is ranked among the highest in its commitment to Cybersecurity. We essentially lead the world in Cybersecurity application and development and have aided some of our geopolitical allies in the advancement of their own cybersecurity. However, one major ally that has been finding itself inadequately equipped is Japan. Japan is the main…