While criminal justice and cybercrime are not the same, the overlap between them is that a lot of crimes today are committed with computers online. Cyber crime is the act of committing these crimes with a computer and other various technology, while criminal justice is seeking to bring those who commit cyber crime to justice….
Week 10 Entry
Safer A way that computers have made the world safer is digitalizing a lot of things utilized in the physical world. For example, information stored in physical files in cabinets is always vulnerable to even simple mistakes such as spilling water, tearing it by accident, etc. With computers, data can be backed up, reproduced, encrypted,…
Week 9 Entry
Realistically, it is very difficult if not impossible to be 100% sure that your computer is safe. Regardless, you should always be taking the appropriate measures to keeping it as safe as possible. Things like using firewalls, keeping software up to date, running antivirus software, staying away from suspicious links and phishing attempts, etc. are…
Week 7 Entry
While the costs of developing a cyber security program is indefinite and can be quite steep depending on how layered the program is intended to be, it will almost always be worth over suffering potential cyber attacks. Doing a majority of things with programs will cost money. Whether you want to obtain the license of…
Week 6 Entry
As people evolve and change due to what they work with changes, technology is also applicable here. A classic scenario of workplace deviance is stealing the property of others. As people get new and cooler technology, like better iPhones and Androids, it may be stolen by someone else in the same workplace. Harassment is also…
Week 5 Entry
Complex security systems to be sold to companiesYou can teach yourself more about networks and network security to help companies with your knowledgeBug fixing for those who need itEnsuring your company firewall is up to dateReaching out to individuals offering money to find security flaws in their softwareSoftware creation to protect other programs and informationEnsuring…
Week 4 Entry
The difference in cybersecurity risks between the United States and a third world country The biggest difference between the United States and other countries is the relevance in global politics, technological standards, and history of cyber attacks. If we were to compare the U.S. and a third world country, the U.S. is one of the…
Week 3 Entry
Ethical issues concerning storing electronic information about individuals are similar to cyber security concerns, particularly with databases. Risk of data breach – this is one of the most common concerns and ethical issues regarding electronic storage of data; there is always a risk of information being stolen, destroyed, or tampered with. It is for this…
Week 2 Entry
Select four other majors offered by ODU and explain how those majors relate to cybersecurity. Computer science Computer science is probably the closest related major to cybersecurity. Both fields work very closely together with a strong relationship; computer science works with the nature of computers and technology, while cybersecurity works to protect it and keep…
Week 1 Entry
How does your major relate to cybersecurity technology? My major studying at ODU is cybersecurity. As you could guess, it is directly related to the topic at hand. Anything that happens or develops relating to cybersecurity technology affects me and my future field of work. An example of a major event that could end up…