Security is a must-have when it comes to businesses and establishments. The main purpose of security is protection, which includes security threats and breaches. Technology is growing each day, so we have to stay ahead to prevent hackers from getting through the boundaries. We have to keep up with such crimes, therefore it is very…
Week 12
In the past, crimes were mainly committed face to face by the offenders. Now that technology is more advanced crimes are also committed online rather than just in person. Due to the advancements in technology, cybercrimes can happen through laptops, smartphones, tablets, apple watches, and any device that has the advancements to have access to…
Week 11
While criminal justice and cybercrime are different they are overall very similar in what they do and their goals. Due to the upbringing of technology and all of its advances it is becoming just as important as criminal justice if not even more tricky to solve cybercrimes. The overlap in criminal justice and cybercrime will…
Week 10
Engineers make cyber- networks safer by creating new cyber networks and they are always looking to improve networks as well. Engineers are the backbones of cyber networks. They make sure hackers and people that aren’t authorized aren’t gaining backdoor access through a soft- spot in a firewall, monitoring the network to ensure that it is…
Week 9
There are a few more positives of computers than negatives, but negative computer practices can be very harmful. Technology in schools/education can go both ways. Computers changed the ways of education and how students learn. Anyone can get a degree online and it allows access for information to get stolen. Computers can also take away…
Week 8
To protect your device to the max, physical devices can be used in authentication to protect your devices such as a computer. Etoken is a physical device kept by the user that stores the data physically on the device. There are also smart cards and RFID ( which were mentioned in the notes.) There are…
Week 7/8
Cybersecurity programs are a very crucial step in having a safe and secure business. It protects small and big businesses’ information and materials from being hacked. Although it is an expensive add-on to a business, especially one that is just getting started, it is worth it because it is more costly to recover from an…
Week 6
First, deviance is defined as “the fact or state of departing from usual or accepted standards, especially in social or sexual behavior.” My definition of workplace deviance is causing harm or damages to the company you are employed for. Cybertechnology has improved drastically from what it used to be. It is much easier for workplace…
Week 5
CYBERSECURITY Create an app that rates software. Yacht GPS software that is secure By conducting vulnerability analysis Encrypting private information Run test ( penetration testing) Software tools Encryption and decryption of messages Cyber training Using and providing outsourced technology support Risk management Independent consulting Tracking any suspicious activities Youth awareness of cybercrime
Week 4
I will be comparing the U.S and Japan. After reading this article, it shows just how behind Japan is to other countries like the U.S. The title of the article is “ How japan’s new cybersecurity strategy will bring the country up to par with the rest of the world.” This just shows that although…