How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? (journal 13)

There are many different ways to approach the development of cyber-policy and infrastructure. One approach to the development of cyber-policy and infrastructure would be focusing on a risk-based strategy that will identify and prioritize infrastructure, critical assets, and systems. This Continue reading How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? (journal 13)

How does cyber technology impact interactions between offenders and victims? (journal 12)

Cyber technology has impacted interactions between offenders and victims in many ways. One of which being that cyber technology has provided a new channel for harassment and stalking. Victims’ movements can now be tracked by stalkers, and in addition to Continue reading How does cyber technology impact interactions between offenders and victims? (journal 12)

What is the overlap between criminal justice and cybercrime? How does this relate to the other disciplines discussed in class? (journal 11)

Criminal justice and cybercrime overlap in several key areas. One of which being the investigation of cyber crime. Law enforcement agencies ,like the police or FBI, all have specialized units that investigate cybercrime, and they typically work together to hunt Continue reading What is the overlap between criminal justice and cybercrime? How does this relate to the other disciplines discussed in class? (journal 11)

How do engineers make cyber networks safer? (journal 10)

There are many different ways that engineers have made cyber networks safer. One way they make cyber networks safer is by conducting risk assessments. Risk assessments help engineers identify vulnerabilities in a system, and can help engineers understand how a Continue reading How do engineers make cyber networks safer? (journal 10)

Three ways that computers have made the world safer and less safe. (journal 9)

Computers have made the world a safer place, while at the same time making the world unsafe. One way computers have made the world better is through healthcare. Thanks to computers, we have better health records, better treatment and diagnosis, Continue reading Three ways that computers have made the world safer and less safe. (journal 9)

How can you tell if your computer is safe? (Journal 8)

There are several measures one can take to ensure the safety of their computer. One of the most important ways to ensure the safety of your computer is by installing antivirus software. Antivirus software is designed to protect your computer Continue reading How can you tell if your computer is safe? (Journal 8)

What are the costs and benefits of developing cybersecurity programs in business? (Journal 7)

Businesses developing a cybersecurity program can help them avoid risks, such as loss of data and financial losses, as well as protecting their assets. However, developing a cybersecurity program has its costs/benefits, with one of the benefits being risk mitigation. Continue reading What are the costs and benefits of developing cybersecurity programs in business? (Journal 7)

How has cyber technology created opportunities for workplace deviance? (Journal 6)

Workplace deviance is defined as “The deliberate desire to cause harm to an organization–more specifically, a workplace.” Cyber technologies have offered opportunities for this kind of behavior to occur in several ways. One of which being common in many workplaces, Continue reading How has cyber technology created opportunities for workplace deviance? (Journal 6)

Comparing cybersecurity risks in the United States and Russia (journal 4)

There are several cybersecurity risks that affect the United States of America. Some of those risks include data breaches, cyber attacks on critical infrastructure, and cybercrime that is targeted towards individuals and businesses. Cyberattacks on critical infrastructure, like the electrical Continue reading Comparing cybersecurity risks in the United States and Russia (journal 4)

Four ethical issues that arise when storing electronic information about individuals (Journal 3)

There are a number of ethical issues that arise when concerning storing electronic information about individuals, primarily in the area of Electronic Health Records (EHR’s). One issue that can arise is privacy and confidentiality. Privacy is the right of an Continue reading Four ethical issues that arise when storing electronic information about individuals (Journal 3)