Fill in content about yourself.
To start, view our quick WordPress tutorials! For more help, make an appointment with The Center for High Impact Practice’s ePortfolio Team.
Entry 1
Why are you interested in cybersecurity technology?
I’m interested in cybersecurity technology because it’s a constantly evolving field that requires a mix of technical skills and creativity. Cybersecurity is a critical aspect of technology that involves protecting computers, servers, mobile devices, electronic systems, networks, and data from digital attacks, theft, and damage. With the increasing reliance on technology in our daily lives, the importance of cybersecurity has become more important than ever.
The field of cybersecurity is constantly changing, and this is what makes it so exciting. Every day, new threats and vulnerabilities emerge, and it’s up to cybersecurity professionals to find ways to protect against them. This requires a mix of technical skills, creativity, and problem-solving abilities. Cybersecurity professionals must be able to think outside the box and come up with innovative solutions to complex problems.
one more thing it’s a field that has a real impact on people’s lives. Cyber attacks can lead to data breaches, identity theft, and financial loss. By working in cybersecurity, I feel like I’m making a difference by helping to protect people’s personal information and sensitive data. Overall, I’m passionate about cybersecurity because it’s a field that requires a mix of technical skills, creativity, and problem-solving abilities, and it has a real impact on people’s lives.
Entry 2
four other majors offered by ODU and explain how those majors relate to cybersecurity.
Four majors related to Cyber Security are Computer science, Information Technology, and Programming, software engineering. The first one Software engineering is related to cyber security because it teaches students the fundamental principles of computing, programming, and software engineering. These skills are essential for understanding how cyber attacks work and developing effective strategies for preventing any future harm to your computer or any device.
Another one is Information technology related to cyber security because it focuses on the management and use of computer-based information systems. This includes topics such as network security, data protection, and risk management, all of which are important aspects of cyber security. also give you a general understanding of how technology works and understand the risks that can cause and understand the network a little better.
One of my favorite ones is Programming But really difficult for me to understand but is also related to cyber security because it is used to create and maintain the software and systems that are used to protect against cyber attacks. Programmers use languages like Python, Java, and C++ to develop security tools, analyze network traffic, and identify vulnerabilities in software.
The last one is Software engineering because it involves the design, development, and maintenance of software systems. Cyber security professionals use software engineering principles to create secure software that can withstand cyber attacks. They also use software engineering tools and techniques to analyze, test, and maintain the security of software systems.
Entry 3
Describe four ethical issues that arise when storing electronic information about individuals.
there are many ethical issues that affect storing electronic information about individuals. Four examples that I choose were privacy, security, accuracy, and access. Privacy I think is one of the most major ethical issues when it comes to storing electronic information about individuals. People have a right to privacy and no company should be able to share the information, and this includes the right to control who has access to their personal information or other use. When electronic information is stored, they can be a risk that it will be accessed by unauthorized individuals known as hackers or people with bad intentions. This can lead to identity theft, Money getting stolen, and other intentional harm to yourself.
Security is mostly related to privacy, and it is another major ethical issue when storing electronic information. Electronic information is vulnerable to attack if you don’t know how to protect your information especially older adults, and it is important to take steps to protect it from unauthorized access. One way of protecting yourself from unauthorized users is encryption, firewalls, and other security measures to prevent hackers from gaining access to the information. It is also important to have policies and procedures in place to ensure that employees are trained to handle sensitive information appropriately.
Another one is Accuracy is an ethical issue that arises when storing electronic information about individuals. People have a right to expect that the information stored about them is accurate and up-to-date and protected by those companies. When information is inaccurate, it can lead to serious consequences, such as being denied credit or employment due to other people using their information. It is important to have procedures in place to ensure that information is kept up-to-date and that errors are corrected promptly.
The last one is Access, the final ethical issue that arises when storing electronic information about individuals. People have a right to access their own information, and it is important to have procedures in place to ensure that they can do so. This can include providing access to electronic records, as well as providing copies of records to their request.
In conclusion, it’s always important to protect your information and investigate a few more ways how to protect yourself. one more thing always is good to teach your family about how to protect their information to prevent future harm to family members due they are older and have less knowledge about technology
Entry 4
Compare cybersecurity risks in the U.S. and another country.
comparing cyber security risks in the U.S. to another country is really challenging due to their technological development one example is how much their computers our updated or there internet speed and if all the areas of the country have access to the internet, the sophistication of cyber criminals, and the regulatory environment. One country that is often compared to the U.S. in terms of cyber security risks in China. China has a rapidly growing economy and a large population, which has led to a significant increase in the use of technology and the Internet. However, China also has a reputation for being a hotbed of cybercrime and espionage in the U.S.
One of the biggest cyber security risks in China is state-sponsored hacking. The Chinese government has been accused of hacking into the computer systems of U.S. companies and government agencies in order to steal sensitive information. This has led to tensions between the two countries and has raised concerns about the security of U.S. data an example is the famous App TikTok owned by Bytedance. Many politicians from the U.S. government believe that the Chinese government has access to American information in not been use the proper way. so this concern makes them believe of banning the app TikTok from the U.S. will fix the problem without realizing people will still use the app using VPN in becoming an illegal app.
Other governments have different laws on cyber Security on how people can interact on the internet and what is legal and illegal, always Make sure you keep your knowledge updated if you are planning to travel to another country before using the internet there can be some things that look normal to you but for them is probably illegal. another example is North Korea population has no access to the internet or outside world information everything they do is controlled by the government and if they broke this law they will be getting in trouble or sent to a concentration camp.
Entry 5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.
Consulting services for cyber security
Yielding profits from cybersecurity-related investments
B building cyber security softwares to sell them
Ethical hacking and penetration testing services to companies
Running cyber security training course
Selling cyber security policies
Establishing and managing cybersecurity compliance programs
Creating and selling cybersecurity hardware and equipment
Upgrading and maintaining computer systems
Researching and developing new cybersecurity technologies
Implementing cybersecurity solutions for client
Teach older adults how to protect their information
Yielding profits from cybersecurity-related patents and copyrights
Entry 6
How has cyber technology created opportunities for workplace deviance?
Cyber technology has created many opportunities for workplace deviance. Deviant behavior in the workplace can take many forms, including cyberbullying, cyberloafing, cyber stalking, and cyber theft. The anonymity and distance that cyber technology provides can make it easier for employees to engage in these behaviors without getting caught but not difficult. One of the ways that cyber technology has created opportunities for workplace deviance is through cyberloafing. Cyberloafing refers to the practice of using work computers and internet access for personal activities for example browsing social media or shopping online. With the rise of remote work and flexible schedules, cyberloafing has become more prevalent and decreased productivity and morale in the workplace.
Another way that cyber technology has created opportunities for workplace deviance is through cyberbullying. Cyberbullying involves using technology to harass, intimidate, or humiliate someone. This can occur through email, social media, or other online channels. Something important about Cyberbullying is that you can face serious consequences for both the victim and the organization, including decreased productivity, increased absenteeism, and legal liability. also, Cyber technology has also created opportunities for cyberstalking in the workplace. Cyberstalking is basically using technology to monitor, track, or harass someone online without being physically present. This can include sending unwanted emails, tracking someone’s location, or monitoring their online activity. Cyberstalking can be particularly harmful in the workplace, where employees may feel trapped or unable to escape the behavior.
cyber technology has created opportunities for cyber theft in the workplace but very Unethical. Cyber theft involves stealing sensitive information is one major problem because every day someone gets their information stolen by these people for inappropriate use, such as trade secrets or customer data. This can occur through hacking, phishing, or other cyber attacks. Cyber theft can have serious financial and legal consequences for organizations. Cyber technology can create opportunities but at the end of the day you choose if you want to do the right thing always remember that there are laws the protect people’s private information and if you break them you can get in trouble.
Entry 7
Entry 8
How can you tell if your computer is safe?
There are many techniques that I use to ensure that my computer is safe. One of them is keeping my computer updated with the latest software to prevent any vulnerabilities, attacks, or errors from outdated software. This is important because before, I wasn’t updating my computer, and I was getting too much spam on my home screen. I knew something was wrong with my computer’s security, so I had a friend who was studying cybersecurity check my computer settings. He told me that my software was not updated, making it easy for people to access my information. Since that day, I always make sure to keep all my devices updated.
Another technique I use to keep myself safe from outside cyber-attacks is installing anti-virus software to make sure my computer has extra protection in case of someone tries to access my personal information, Not to mention changing my password every 30 days to make sure my information is safe in prevent them from finding my password. another daily routine I do is following cyber security accounts that keep me updated about everything going on in the world to prevent it from happening to me there are a lot of skills you can learn from those accounts for example checking the settings of your device to make sure apps don’t have to much access to your information, for example, sharing location or credit card information and not save your credit card information on this apps.
Not opening emails with links that contain information that looks good to be true is another way I protect myself from fraud knowing your computer really well and knowing what you have is the most important way to protect yourself, never open links without confirming the people who are sending it is legit
Entry 9
Describe three ways that computers have made the world safer and less safe.
One way That Computers have made the world safer is by providing enhanced security measures to protect our data and personal information. For example, encryption algorithms and two-factor authentication protect our online accounts from unauthorized access. another one is biometric authentication, such as fingerprint and facial recognition, which has become increasingly popular in recent years, making it more difficult for unauthorized individuals to access our devices.
Computers have also made the world safer by advancing medical research and treatment. Medical professionals can now use computers to analyze large amounts of data and identify patterns that help diagnose and treat diseases. Medical devices, such as pacemakers and insulin pumps, are now connected to the internet, allowing doctors to monitor patients remotely and respond quickly in case of an emergency. Not to mention how much information they collect from the patience that can be beneficial for future problems in keeping records and value information for other hospitals. this is a true example of how technology has a big impact on our daily lives we can almost say is technology everywhere. computers also help us in education.
Finally, computers have raised concerns about privacy. Companies can collect large amounts of data about users without their knowledge or consent, and this data can be used for targeted advertising or other purposes. In addition, government surveillance programs have raised concerns about the extent to which our online activities are being monitored. privacy is a huge problem in today’s world leading to people being scared of technology due to companies selling their information in not keeping it safe. privacy is my main concern about technology because there can be a lot of things that one simple post can damage your whole reputation.
Entry 10
How do engineers make cyber networks safer?
One of the most important things software engineers know about how to make cyber networks safer is to develop secure code. This means writing code that is free from vulnerabilities and that follows best practices for security. By doing that, engineers can prevent hackers from exploiting weaknesses in the code and gaining access to sensitive data from your device. another one is that they can also implement security protocols, such as encryption and multi-factor authentication, to protect data from unauthorized access. These protocols can make it much more difficult for hackers to steal data or get access to systems.