ePortfolio #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? I believe that all things should be done with precaution and taken care of proactively to ensure the fallback safety that you provided in case things went bad. The idea of “short arm” of predictive knowledge does not…

ePortfolio #12

How does cyber technology impact interactions between offenders and victims? With the introduction of the internet to almost all possible devices, the possibilities have been endless in the interactions between both the offender and the victim as many participate in scams and are exposed to malicious software every day. The interaction that is extremely dangerous…

ePortfolio #11

The overlap of criminal justice and cyber crime is a very large one to say the least. In the recent years not only have criminals upped their game, but also the ones who are out catching those criminals as well. This goes for not only law enforcement, but also military as well, and the justice…

ePortfolio #10

As an engineer, your job is to build, but not also just to build, but to also build safely to allow others to be safe as well. An engineer needs to be good at their job as they do all of the work behind the scenes to make sure that whatever is under construction has…

ePortfolio #9

The introduction of computers have made the world into both a beautiful and expansive place, as well as a dark and dangerous place for cybercriminals to lurk and do bad business. Computers have taken us to places we could’ve only dreamed of in the past. With computers, we couldn’t have gotten to the moon and…

ePortfolio #8

In order to tell if your computer is safe, see if it first has any sort of anti-malware or anti-virus programs that it could be running to help allow it to remain safe on the networks the computer is connected to. The next thing you could do is look at the network that the computers…

ePortfolio #7

When starting a new business one measure that is not usually properly taken is the introduction of a cyber security network to house all information and provide and stable and safe place to keep company information safe from being breached.   Cyber security programs in business are the huge line of defense for doing all…

ePortfolio #6

Cyber Technology while has been beneficial to the many advancements to the corporate and industrial world.  With these advancements come lots of convenience for these industries and money that is saved in the long run using networks to link and use these devices with ease.  Along with this convivence of use, it can also be…

ePortfolio #5

C- Creates app that rates software Y- Yacht GPS software B- Block Chain developer E- Ethical hacker R- Reverse Engineer S- Security auditor E- Encryption of data C- Computer Forensics U- U.S Government like military R- Red team member I- Incident responder T- Threat hunter Y- Yacht personal network Free Write: Industrial cyber security is…

ePortfolio Entry #4

Cybersecurity risks for all countries are different ranging from their enemies and allies, future risk, the country’s impact on the world, and their global rankings for their technological advancements, to even their ideals and daily operations. The United States has a few enemies and others who oppose their ideas as well that are cause for…