How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge? Developing new cyber-policy and infrastructure in a fast-paced technical world is difficult. This is because predicting potential cyber threats and vulnerabilities is also very difficult. In most cases, cyber professionals, or really any organization, only realize some of…
Category: CYSE 200T Journals
ePortfolio Entry #12
How does cyber technology impact interactions between offenders and victims? Over the past two decades, the use of cyber technology has significantly increased. Cyber technology has incorporated itself into every aspect of every day life with many different types of users. These users include people of all ages and social statuses. In a lot of…
ePortfolio Entry #11
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? When discussing criminal justice and cybercrime, it is hard to make distinctions in many different areas. As technology has progressed, so has every other discipline surrounding technology. Traditional crimes that were taking place…
ePortfolio Entry #10
How do engineers make cyber networks safer? There are many different engineering disciplines that come together to assist in improving and making cyber networks safer. The major one that I would like to focus on is the security engineer. Security engineers are responsible for designing systems that prevent intruders or hackers from gaining access to…
ePortfolio Entry #9
Describe three ways that computers have made the world safer and less safe. The development of computers have had a serious impact on the world. They have integrated themselves into almost every aspect of our lives and continue to improve with different tasks and needs. Computers have helped make the world safer, but also have…
ePortfolio Entry #8
How can you tell if your computer is safe? When it comes to keeping your computer safe, there is a lot to keep in mind. My first suggestion always would be to make sure that your system is fully up to date at all times. A lot of attackers take advantage of older systems due…
ePortfolio Entry #7
What are the costs and benefits of developing cybersecurity programs in business? When creating a business, it is important to remember that cybersecurity is a crucial part in anyone’s business that is connected online or uses a network. Business and cybersecurity overlap in numerous ways: Businesses must ensure their computer systems and networks are secure,…
ePortfolio Entry #6
How has cyber technology created opportunities for workplace deviance? Workplace deviance refers to behavior of an individual that violates the organization that they work for, often resulting in the harm of the organization. Workplace deviance can be classified into many different types of behavior and actions such as aggressive behavior, unproductive behavior, intentional abuse of…
ePortfolio Entry #5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Consult in a cybersecurity firm YouTube videos containing cyber educational material and technical tutorials Become a speaker at different cybersecurity events Ethical hacking Research ongoing cyber threats and mitigation techniques Security Auditing Editor for security software development Create a…
ePortfolio Entry #4
Compare cybersecurity risks in the U.S. and another country. When examining cybersecurity risks throughout the world, it is no question that cyber crime spreads everywhere. In so many different countries, there are reports of many different cyber threats that each country is facing. Many studies have tried to examine the different risks amongst different countries…