We should approach the development of cyber policy with an open mind when it comes to advancing how new things should be according to the worlds climate. People are changing the way they use the internet almost every single day. There are new programs that come out basically everyday as well which is a great…
Journal #11
Cyber makes it very easy for victims and suspects to interact with each other in the online world. There are billions of online accounts ready to be hijacked for the benefit of the hacker. The internet basically is a big bridge for suspects and victims if they aren’t careful of what they post on the…
Journal #10
cyber crime and criminal justice relate in many different ways and there are a ton of different reasons on why they are like that. to start off, cyber crime is a part of criminal justice which is a huge topic in that subject of study. with their being tons of crime in this world they…
Journal #9
The history of the computers being a tool that we use often in this world is a very controversial topic if they are really safe or not. Being that computers are always connected to something that means that we always have a way of communication for the world to know how we are doing at…
Journal #8
Getting to know if your computer is safe is one of the best things that you can do for yourself and your family. Being that your computer most likely houses some of your personal information that is probably really sensitive, you should really try to install anything to see if your computer is safe or…
Journal #7
The cost of implementing cybersecurity is worth whatever the cost is. The data that you hold will most likely be a lot more valuable and important than what cost of security will be. In the event of a cyber attack you will be grateful that you spent the amount of money that you needed to…
Journal #6
The cyber world has created a lot of deviance in the workplace. With the use of technology it is very easy to access anything that is on the internet. Many workplaces of enacted rules on what you can look up and do on your computers. It is very hard to control these types of people…
Journal #5
Creating a secure network Your firewall being protected Being on watch for an attack Engineering a safe application Reading safety topics to employees Securing a new company network Encrypting a network Coming up with new security tactics Utilizing new security tactics Reacting to a major cyber attack Investigating a recent hack Taking out vulnerabilities in…
Journal #4
Security risks are becoming a new normal in this great world of technology. With everything being storing online, it makes all of the information in the world easy to access. There is a huge con when it comes to storing information on a network though. Networks are hackable and that created a huge security risk….
Journal #3
Describe four ethical issues that arise when storing electronic information about individuals. The main ethical issue from storing data digitally would be that hackers are everywhere. They’re always out looking for something to hack for their own advantage. Whether it’s money, people’s information, or data that isn’t safe for the public to know, someone is…