Journal Entry #14

Andriy Slynchuk has described eleven things Internet users do that may be illegal.  Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. In Andriy Slynchuk’s blog “11 Illegal Things You Unknowingly Do on the Internet” the topic of common things that people do on…

ePortfolio Entry #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? When discussing criminal justice and cybercrime, it is hard to make distinctions in many different areas. As technology has progressed, so has every other discipline surrounding technology. Traditional crimes that were taking place…

Journal Entry #12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf  sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.   The sample letter essentially is informing all prior customers that have given financial data, that their data may have been compromised. It gives a few sections where it informs the consumer: what…

ePortfolio Entry #10

How do engineers make cyber networks safer? There are many different engineering disciplines that come together to assist in improving and making cyber networks safer. The major one that I would like to focus on is the security engineer. Security engineers are responsible for designing systems that prevent intruders or hackers from gaining access to…

Journal Entry #10

Read this and write a journal entry summarizing your response to the article on social cybersecurity. https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ The article “Social Cybersecurity: An Emerging National Security Requirement” by Lt. Col. David M. Beskow and Kathleen M. Carley, PhD discusses the importance of social cybersecurity and the change that is has caused within warfare tactics. As stated…

ePortfolio Entry #9

Describe three ways that computers have made the world safer and less safe. The development of computers have had a serious impact on the world. They have integrated themselves into almost every aspect of our lives and continue to improve with different tasks and needs. Computers have helped make the world safer, but also have…

Journal Entry #9

Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? During the past year, have you … I scored 1/9 which is considered to be a norm for this scale. Anything between 2-5…

ePortfolio Entry #8

How can you tell if your computer is safe? When it comes to keeping your computer safe, there is a lot to keep in mind. My first suggestion always would be to make sure that your system is fully up to date at all times. A lot of attackers take advantage of older systems due…

ePortfolio Entry #7

What are the costs and benefits of developing cybersecurity programs in business? When creating a business, it is important to remember that cybersecurity is a crucial part in anyone’s business that is connected online or uses a network. Business and cybersecurity overlap in numerous ways: Businesses must ensure their computer systems and networks are secure,…

Journal Entry #8

Watch this video and pay attention to the way that movies distort hackers: “Hacker Rates 12 Hacking Scenes In Movies and TV | How Real Is It? – YouTube”. Write a Journal Entry about how you think the media influences our understanding about cybersecurity. The media influences a lot of the general public’s view of…