ODU Logo

Josiah Hill

Student Name

Category Uncategorized

13. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

Since no one can predict the future cyber security  ethics must be left open ended because nobody knows what kinds of innovations could lead to new ways for hackers and or entities too find loopholes in any kind of set… Continue Reading →

12. How does cyber technology impact interactions between offenders and victims?

Over the years computer technology has advanced rapidly to the point where someone or something could be in your computer without you even knowing this does affect how cybercriminals operate when trying to hack into someone’s computer to steal their… Continue Reading →

11. What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

Criminal justice and cyber crime are two directly related topics because cyber crime is in essence the expansion of the criminal capability envelope. With the advent of a connected world fueled by computers the internet and great leaps in technological… Continue Reading →

10. How do engineers make cyber networks safer?

Engineers make cyber networks safer by designing and implementing technology that is used to make them harder to access by un authorized parties. Engineers who work in cyber security are responsible for some of the most technologically advanced systems used… Continue Reading →

9. Describe three ways that computers have made the world safer and less safe

The world as we know it changed forever with the advent of computers and the internet. Even from their earliest days computers have helped mankind achieve unthinkable wonders. In 1969 a series of computers and sensors is what allowed Neil… Continue Reading →

8. How can you tell if your computer is safe?

Some of the more common ways to tell if your computer is safe is to check your browser settings. On my computer I can go to settings and turn on filters to avoid unverified sites that may contain viruses. Most… Continue Reading →

7. What are the costs and benefits of developing cybersecurity programs in business?

Cyber security is extremely important in the business world. Almost every modern business uses some form of electronic or digital system that is prone to cyber threats. Costs associated with implementing anything in business tends to be something of important… Continue Reading →

6. How has cyber technology created opportunities for workplace deviance?

There are many ways that cyber security technology can cause opportunities for workplace deviance however one of the most notable is the indirect access problems  that can occur with some companies using bring your own device policies. Bringing your own… Continue Reading →

5. Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.

Create app that rates software. Yacht GPS software that is secure Build a network and use it to run servers Earn money by working for a cyber security firm Rent a building to base your cyber security company in Sell… Continue Reading →

4. Compare cybersecurity risks in the U.S. and another country.

In cyber security risk is defined as the probability of exposure or loss resulting from a cyber attack or a breach in an organization’s security system. Depending on the location in the world different threats and risks can arise for… Continue Reading →

« Older posts

© 2025 Josiah Hill — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑