Journal Entry #6

How do engineers make cyber networks safer? Engineers incorporate security principles and practices into the design of network infrastructures and systems. They do threat modeling, consider security requirements, and implement robust security controls from the ground up. When engineers integrate security into the design process, engineers can create a solid foundation for network safety. A…

Journal Entry #5

How can you tell if your computer is safe? By ensuring the operating system, applications, and antivirus software are up to date with the latest security patches. Regularly installing updates can help keep your computer safe from nefarious individuals trying to get to your information. Keeping an eye on your computer’s system logs can ensure…

Journal Entry #4

The cost and benefits of developing a cybersecurity program in business: The costs and benefits of developing a cybersecurity program can vary greatly depending on many factors; the size of the organization, the industry it operates in, the level of risk, and the specific cybersecurity measures necessary or implemented. Costs: Benefits:

Journal Entry #3

How has cyber technology created opportunities for workplace deviance? Increased connectivity, anonymity, and accessibility have all opened the door to new levels of workplace deviance previously unseen. Unauthorized access has become a major factor in workplace deviance. Disgruntled employees have the opportunity to access vital or sensitive information and leak it to unsavory entities or…

Journal Entry #2

Several ethical issues can arise when storing electronic information about individuals. One of the foremost concerns is the protection of the privacy and personal data of the individual. Storing this sensitive information opens the door to attackers stealing personal and financial records, medical information, or browsing habits. Informed consent and transparency are crucial to have…

Journal Entry #1

As a new professional entering the world of cybersecurity, there and several reasons why the field captivates me. First, the ever-growing threat landscape in the digital world is a major driver behind my held interest. With the increasing frequency of cyber attacks, it has become crucial to safeguard sensitive information, systems, and networks from persons…