We should approach the development of cyber-policy and infrastructure with caution and care especially because we still are learning what it is and how we can develop it to be the best use to us. Just like any interaction online, we should be aware and careful of anything that seems off or false about something….
ePortfolio Entry -4 (Week 13)
Cyber technology impacts both offenders and victims in positive and negative ways. To begin with, I think there are two elements to offenders and victims when it comes to cyber technology. The two elements whether or not there is or is not a relationship between the offender and victim. Beginning with the offender alone, this…
Portfolio Entry Week 12
There are many different factors to the overlap between criminal justice and cybercrime. To begin with, criminal justice, according to Wikipedia, is defined as “the delivery of justice to those who have been accused of committing crimes”. On the other hand, cybercrime, according to Wikipedia, is defined as “a crime that involves a computer and…
Portfolio Entry #10
Engineers help to make cyber networks safer in multiple ways. The first way is observing reaction modifications to fielded systems. This means that the engineering effort responds to things such as disruptions, hazards, and threats, as well as cyber-attacks, incidents, errors, and any other unexpected occurrence. This can occur during any of the three stages…
Portfolio Entry #9
There are lots of ways that computers help to keep the world a safer place while also making it a dangerous one. Firstly, computers keep the world safe by protecting information. Data encryption keeps your information for only yourself. As well as keeping your information safe, it lessens the restrain of having to have a…
Journal Entry #8
There are many ways to tell if your computer is safe. The word “safe” has a lot of meaning, however. I would consider a “safe” computer, or any device, as something that is free from viruses or has protection from unauthorized users. Generally, I would not feel the need to wonder if my device is…
Journal Entry #7
As we, not only in the United States, but in the world, move towards a more digital path in business, is it imperative that businesses develop and implement cybersecurity training programs and setups. Having these programs within their businesses allows for so many wonderful things to be produced, but there are also some drawbacks along…
Journal Entry #6
There are many ways cyber technology has created opportunities for workplace deviance. First of all, the intention for new technological developments and the use of the internet should never be used for negative purposes in the workplace. When a new feature is available for download on a server’s operating system or employees have access to…
Journal Entry #5
Create app that rates software Yacht GPS software that is secure Be an independent consultant Ecommerce security Represent businesses Sales Educate yourself and others about cybersecurity Create training courses Understand computers and coding Rent property to a cybersecurity company Individual coaching/training with others Technical support for companies Youtube- create helpful guides/tutorials
Journal Entry #4
Cybersecurity risks will always be present no matter where you are in the world. I think that North America is definitely a bigger risk for cybersecurity attacks because we are the most militaristically advanced nation, and other countries want to develop our technology and weapons for the benefit of theirs. Over half of digital security…