EPORTFOLIO # 13

E-portf 13 How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? In trying to predict the trajectory of cyberthreats in the present day and age, it will be a highly challenging discussion topic. However, to protect assets and valuable information regarding the business and employees, companies, organizations,…

EPORTFOLIO #12

EPortfolio #12 How does cyber technology impact interactions between offenders and victims? The advancement of technology has introduced a highly sophisticated level of cybercrimes and offenders globally. Cyber offending has gone to the point where there are barely any signs of their attacks, and neither is the law enforcement able to track the crimes easily….

EPORTFOLIO# 11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the  Technological advancements have certainly drawn some connections between Criminal justice and Cybercrime. The use of technology has increased and enhanced the approaches to criminality in the cybersphere. The internet, computers, and mobile technologies have reshaped our societies. With that being…

ePortfolio #10

How do engineers make cyber networks safer Engineers are responsible for creating computer systems capable of managing disruptions of cyber-attacks and breaches. As an integral part of systems engineering, systems security engineering helps to ensure that the appropriate security principles, concepts, methods, and practices are applied during the system life cycle to achieve stakeholder objectives…

EPORTFOLIO# 9

Activities of our present-day and age are heavily networked and computer-dependent from work, school, building a social life and keeping up with friends worldwide. One may say the world is safer today, and others may say it has become less safe. In my opinion, it is highly dependent on the area of consideration. There are…

Journal #8

How can you tell if your computer is safe? A few of the topics discussed this semester evolves around computer safety and information assurance. Ensuring we are working and sharing information on a safe computer is very important as most of our information might be critical and contain people’s identity. Few ways to check and…

eportforlio # 6

How has cyber technology created opportunity for workplace deviance? The introduction of cyber technology has drastically enhanced connectivity, productivity, and communication at the workplace. With the induction of cyber technology, employees have attained the knowledge required to navigate cyberspace for work and personal reasons, especially in industries where the ” Bring Your Own Device” (BYOD)…

portfolio # 7

Eportfolio # 7 What are the cost and benefits of developing cybersecurity programs in businesses? Cybersecurity has benefited businesses in the last decade, considering the vast amount of information they have to keep safe from unauthorized users. Research has proven that companies lose millions of dollars to cyberattacks, and some businesses do not realize they…

How has cyber technology created opportunity for workplace deviance?

portfolio # 6 The introduction of cyber technology has drastically enhanced connectivity, productivity, and communication at the workplace. With the induction of cyber technology, employees have attained the knowledge required to navigate cyberspace for work and personal reasons, especially in industries where the ” Bring Your Own Device” (BYOD) policy is effective. Workplace deviance, as…

eportforlio # 5

Portfolio #5  Use the letters of the work CYBERSECURITY to list legal ways to make money in cybersecurity. For example: Create app that rate software Yacht GPS software that is secured C: Create a control access app to help monitor systems from remote location. Y: Yearbook apps and software with access to only members of the year…