Posted by bcumi001 | 0 Comments
Journal Entry #9
1. Describe three ways that computers have made the world safer and less safe.
Technology has revolutionized our world. Up to this point, our world is extremely reliant on various methods in utilizing technology to achieve common goals. Encryption, antivirus software programs, password protection methods, safe communication with apps such as “signal” or “Telegram,” can make computers/technology devices safer all around. However, there are various parameters surrounding what is safe and what is not safe when it comes to technology by considering how viruses form on computers, how hackers are able to get into computer software, infection of a device due to breakdown from hacking/attacks, going onto websites that steal personal information, and the lack of communication face to face interaction has over communicating electronically. Living in a world where technology is more advanced, high speed, and infiltrated within our daily lives, allows us to be able to accomplish more in a productive manner. It is easier to communicate when you can send a quick email or text on a computer as well. Computers become unsafe when they are used for irrational purposes, criminal purposes, phishing attempts, scam attempts, fraudulent activity, improper use of social media, plagiarism, and cyberbullying. As long as a computer is protected with antivirus software, up to date with updates/installations, and password protected, there shouldn’t be any kind of safety concerns. If a computer is left in public areas using public/free wifi, not up to date with updates, and not protected with antivirus software, that also can leave it vulnerable for an attacker to steal information and wreak havoc over the system as a whole. By being properly prepared in the event of an emergency occurring, it is best to properly protect your device by keeping in mind all the safety measures recommended for proper device functioning to ensure safety. By doing this, safety is the first priority.
Read MorePosted by bcumi001 | 0 Comments
Journal Entry 13
How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
Cyber policy helps guide us in the right direction in terms of the development of protection, ensuring safety when an attack strikes, and acting as a safety net to prevent attacks as well. Encountering data loss can be devastating for technology users if they aren’t aware of how to approach cyber policy initially. As outlined in the definition of cyber policy being to protect, insure, and plan ahead of time, this wraps up a sequence of short terms that describe cyber policy in a nutshell shell basically. We could call the policy, cyber liability insurance or cyber insurance. This is basically a blanket of protection acting as a defense against viruses and other harmful attacks. By regulating data exchanges, protecting personal information, and acting as cyber security software, it is clear that the development of cyber policy should be approached with open arms and should be looked further into. There are so many great and helpful benefits of cyber policy.
In terms of developing an approach to cyber policy and the infrastructure given in short arm of predictive knowledge, we should utilize the knowledge we already have about this topic and then apply new concepts that can include super intelligence, superficial intelligence, and artificial intelligence to be able to compound this to modern day revolutionary aspects of technology in practicing and implementing cyber policy within our workplaces and organizations
Read MorePosted by bcumi001 | 0 Comments
Journal Entry 12
How does cyber technology impact interactions between offenders and victims?
As technology has increased in this day and age, it has caused a rapid downward spiral effect in communication in terms of human interaction face to face. This is mainly due to the fact that people don’t interact as much as they could be or used to due to the rapid increase in technology. This isn’t necessarily a bad thing because it actually makes communication faster and more easily accessed amongst individuals and organizations themselves. Therefore, more productivity is produced amongst people within an organization or in the world in general. However, face to face communication provides more of a greater connection vs. electronic communication, so there is that slight downside when it comes to comparing the pros and cons of face to face interaction vs. solely electronic based communication. I can see the benefits of both but would much rather have that connection that can only really come from face to face communication.
Read MorePosted by bcumi001 | 0 Comments
Journal Entry 8
How can you tell if your computer is safe?
I can tell that a computer is safe when it has antivirus security software installed on it, loads data within a timely manner without too many ads or pop ups on it when using the internet, all updates are installed, there are no viruses within the system, there is no malware or ransomware within the system, and my personal information is safe when using it. Not all requirements need to be met insider for a computer to be safe when using it, but if you want to protect yourself and information, just use two factor authentication for all login information and safely log out of all browsers, websites, and accounts being used. It does more damage to leave valuable information exposed like this than anything really. If there is viruses on a computer, it would be best to factory reset it and clean out the system before using it. If that isn’t possible, maybe using safe browsing options like Firefox are good options. Maybe even picking the incognito option could be smart in these kinds of cases to prevent personal information from being stolen. We are generally safe in this would and don’t have to fear too much, but there are always ways to prepare in the event that we are not safe right? However, needless to say, just make sure you feel comfortable on your computer before using it, get the right antivirus software that’s right for you, and don’t hesitate to reach out to a cyber security professional for assistance and questions.
Read MorePosted by bcumi001 | 0 Comments
Journal Entry #10
How do engineers make cyber networks safer?
Engineers can track cyber attacks on a network if there is a problem within the network per say a virus has taken control or is causing a bug to infiltrate a slower longevity within the network slowly wreaking havoc across the network. Also, engineers can see if someone has somehow managed to access a network they were not permitted to access. For example, anyone can get into someone else’s WiFi network with a password. However, it’s not only with a password. The primary user of the WiFi network has to accept or deny the foreign associate access to their network. In such cases, bugs and other malicious hackers can get into someone’s personal information somehow and access WiFi password to gain access to someone’s information if they were persistent enough to do so regardless if it was unintentional or maliciously intended. Engineers have the power to track activity within a network and even see the devices using the network and what they are doing while connected to the WiFi network as well. Engineers make sure cyber security is up to date due to the prevalence of a multitude of attacks these days. It is not always negative when an attacker gains control without permission of a network or device, but in most cases it would be better to err on the side of caution and use recommendations provided such as two factor authentication, device management within one’s control center for their specific WiFi network, changing passwords every so often to make sure the same one is not being used, checking for any kind of vulnerabilities creating easy access to hackers/scammers to get into one’s information, etc.
Read MorePosted by bcumi001 | 0 Comments
Journal Entry 11
Describe three ways that computers have made the world safer and less safe.
Computers have become more widely used in this day and age more so than they ever have. Mainly this is because technology is advancing and computers are used to do basically everything. We need them to type assignments, check emails, communicate with one another, research, learn new objectives, create artwork, design, power points, excel, office, Microsoft word, online college, creating businesses, promotions, social media, etc. Computers are one of our main sources of information and data promotion that allows us to expand our horizon in utilizing a more beneficial yet faster way to receive and promote information in its entirety. With that being said, it’s hard to live in this day and age without a computer when working for any kind of organization or company. Computers make our world safe since we can feel comfortable that our work is being completed in a timely, beneficial manner through its usage. We may feel safe using a computer we trust such as a personal laptop used to store information behind password protected authentication. A computer becomes unsafe when it’s used without a user’s knowledge. For example, a computer becomes unsafe when someone accesses personal information without a user’s knowledge.
I think that it becomes unsafe when someone’s personal information is exposed or files are created without primary user knowledge. This can happen for various reasons being that the attacker primarily wants to create havoc for their own disheveled life to create a reaction within the user or just because hacking is something people don’t give much thought to. Being hacked by someone when your personal information is exposed, vandalized, and used without permission is in fact violating, but even if you have everything protected what can you do at the end of the day if a hacker still manages to access your information on your computer due to their own selfish, greedy desires? As corrupt as it is that is where unsafety lies.
Read More