ePortfolio Journal 7

The development of cyber-policy and infrastructure is ongoing and will be for likely as long as we are all alive, as I don’t see the rapid advancement of technology slowing down any time soon. With this advancement inevitably comes greater risks and threats to cybersecurity as a whole. The people attempting to combat these threats…

ePortfolio Journal 6

Engineers can do a lot to make cyber networks safer. They will often run thorough tests on a system to check for its flaws and vulnerabilities. This can include anything doing a standard lookover the network to ensure nothing fails the eye test all the way to getting penetration testers to actually try and crack…

ePortfolio Journal 5

Some things I would look out for to see if a computer is safe would be to first ensure that no sketchy unknown devices have been plugged into it. I would also check the task manager to make sure there were no suspicious processes running. Antivirus software is another great option, there are tools like…

ePortfolio Journal 4

The first thing you should know about the costs and the benefits of developing a cybersecurity program for your business is that the benefits far outweigh the costs. The costs are simple, time and money. Not only is training for cybersecurity taking away from the work that you hired them to do originally, but cybersecurity…

ePortfolio Journal 3

Cyber technology has created opportunities for deviance of all kinds, and workplace deviance is no exception. Not only does everybody have a phone in their pocket tempting them 24/7 to browse the internet instead of working, but it also opens the door for behavior that was not previously feasible. I have personally been in workplaces…

ePortfolio Journal 2

Ethical concerns are bound to arise when storing electronic information about individuals. The most glaring concern is privacy. Humans, especially Americans value their freedom and privacy, or at least an illusion of it. Storing information quickly becomes an invasion of privacy when you make note of every single little thing a person does. Another concern…

ePortfolio Journal 1

I am interested in cybersecurity technology because from a young age I have not only been glued to a computer, but fascinated by malware. I have heard many stories of people who saw a virus popup as a child and were very scared, but also incredibly curious and I can certainly relate. That inspired me…

Career Paper

Penetration testing, a vital aspect of cybersecurity, is largely based on dealing with other people. Penetration testers, or “pen testers” for short, must be technically fluent to be successful in their field, but they also must be proficient in dealing with others. This means knowing how certain people may react upon being presented with a…

Article Review 2

The Article “Digital Justice in Jordan: The Role of Virtual Arbitration Sessions in Modernizing the Legal System” by Sadam Mohammad Awaisheh tackles the topic of the legal system in Jordan, how currently there are already rules in place that limit the use of virtual arbitration, and how it may be worth looking into changing that….

Article Review #1

The article Cyberbullying and Psychological Stress among Female Employees by Mohammed A. Al Doghan and Saman Arshad takes the broader issue of cyberbullying in the workplace and focuses in on the experiences of women in the workforce of Saudi Arabia. The reason they decided to conduct this study was that there had been previous reports…