How does cyber technology impact interactions between offenders and victims? The advancements of technology over time has led us into an age on social media. Social media, although it has its age requirements, any age can end up on some type of platform and usually multiple platforms. This had led to cyber harassment and stalking…
Entry #11
What is the overlap between criminal justice and cybercrime? How does this overlap relate to other disciplines discussed in this class? Throughout time the advancement of technology has allowed crime to not only flourish in person but also online. With increasing cybercrime it leads into the lives of those studying law. Criminal justice students and…
Entry #9
Describe three ways that computers have made the world safer and less safe? Computers and their growth in technology has made many improvements to society that has left humanity in a better place but it has also introduced many hazards. My first thought of computers making the world safer is by using software that allows…
Entry #8
How can you tell if your computer is safe? There are multiple ways to figure out if your computer is safe and there are many safety measures that can be set up to ensure protection on your devices. The first step to keeping your computer safe is by setting up passcodes to log in and…
Entry #7
What are the costs and benefits of developing cybersecurity programs in business? Developing a cybersecurity program in a business is crucial for many reasons. A huge one being the safety of employees and customers. I do believe that there are more pros than cons when it comes to this topic. Starting with cons, the biggest…
Entry #6
How has cyber technology created opportunities for workplace deviance? Workplace deviance is defined by Wikipedia as the “intentional desire to cause harm to an organization or more specifically a workplace.” This can also be referred to insider threat, which is defined by Wikipedia as “a malicious threat to an organization that comes from people within…
Entry #5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Create designs for software Yield reports to analyze network traffic Bring guidance to customers in need of help Encrypt new forms of code Review contracts related to funding, law, and program requirements Supply reports and monitor threats Ensure physical…
Entry #4
Compare Cybersecurity risks in the U.S. to the risks in another country. In the United States, some examples of cybersecurity threats are phishers, insiders, malware and spyware, etc. Phishing is when an attacker poses as a reputable company in order to retrieve information such as account logins, credit card numbers, etc. Insiders are usually employees…
Entry #3
Describe four ethical issues that arise when storing electronic information about individuals. One ethical issue that arises when storing electronic information about individuals is that the information could be compromised. This would unleash all of confidential user information to whoever is attacking the system. For example, imagine the information at a bank was only all…
Entry #2
Select four other majors offered by ODU and explain how those majors relate to Cybersecurity. The first major that I chose is the one that I believe to be the most closely related to Cybersecurity. Computer Science has been the major that many people with careers in Cybersecurity have studied before it grew to be…