Journal # 12

Cyber security technology impacts interactions between offenders and victims by either making the interaction less personal, or making the interaction much more personal. I say this because in some cases the offender can use technology to steal somebody’s identity, information, or find another way to harm without ever even contacting the victim or making it so that the victim knows what is going on. People who use a less personal approach to harming somebody online do things such as just send them emails with links for them to click on, just hack accounts or information, or do things that require no talking or interaction between the offender and victim. On the other hand, offenders can also choose to use a much more personal way and interact with the victim for a long time in order to get information on them. People who do this type of harm usually stalk the victim via social media or their online information, talk to them, possibly make fake accounts in order to follow them and may possibly even pretend to be someone else that the victim knows or trust in order to start talking and get information to use against them. With cybersecurity technology the victim is also able to be able to detect the offender and be able to stop the cyber attack and regain his or her information through less personal means. This can be done by not clicking on any links that are sent from unknown emails or numbers, not going on any websites that are not secure and clicking on things. The response to recovering from a cybersecurity attack has also changed because of the technology because now, with some training, you know ways to get rid of the threat and save your information just by using your computer or technology and backup information in order to get everything back running once the threat is over.

Leave a Reply

Your email address will not be published. Required fields are marked *