About Me

I am a first generation Latino and from Alexandria, Va. I can speak Spanish well and I like to cook.

Fill in content about yourself.

To start, view our quick WordPress tutorials! For more help, make an appointment with The Center for High Impact Practice’s ePortfolio Team.

Journal for Cyber Security in Society

Journal 1: Why are you interested in cybersecurity technology?

Journey 2: Select four other majors offered by ODU and explain how those majors relate to cybersecurity.

Computer science is related to cybersecurity since you are developing software and learning to program. This can help you with cybersecurity since it provides you a foundation and a basic understanding of cybersecurity and can help you better grasp it. Both cybersecurity and computer science majors focus on handling data a lot and constantly changing it. This is a skill both computer scientists and cybersecurity professionals can relate to. They both can also relate on learning computer security and this is major for cybersecurity professionals.

Cyber operations is a part of cybersecurity because it teaches you how to analyze and look through network traffic to protect networks from attacks. Cyber operations protect against high scaled cyber attacks against criminals or foreign intelligence. Compare this to cybersecurity attacks, it is more aggressive. Cybersecurity professionals focus more on virus attacks compared to gathering information against espionage. 

Computer engineering is also related to cybersecurity by building up the networks and the infrastructure of the cybersecurity. This is the base of cybersecurity and security organizations will need someone who knows computer engineering. So this would be a good degree to have if you want to be part of cybersecurity. This is because both of these fields specialize in analyzing data. So computer engineering is heavily related to cyber security and an essential part of it. This degree is probably the most important out of all the degrees listed.

Information and technology is the last major related to cybersecurity since it gives you a better understanding of good data management. Information and technology is more focused on protecting data from unauthorized access compared to cybersecurity which protects data from hackers and attacks. Information and technology is also a good framework for cybersecurity since it teaches you the basics on how to fix basic computer problems.

Journal 2:

Journal 3:  Describe four ethical issues that arise when storing electronic information about individuals.

  1. Privacy about the individual.

a. Information about the individual might leak and or might be looked at without authorization .

2. Security breaches

a. There might be times that a virus breaches the storage of electronic information. This can lead to info being stolen.

3. System implementation

a. The system might’ve been implemented incorrectly therefore leaving security patches letting viruses or attackers through.

4. Data inaccuracies

a. Data might’ve been put in wrong therefore the storage will be faulty. Let’s say you add in a extra letter, it would be a whole new person.

Journal 4:

Journal 5:

Cyber security analyst

Yahoo web developer

Business information analyst

Engineer/Software developer

Responder/Incident analyst

Security administrator

Ethical hacker

Chief information security officer

University of Virginia professor of cyber security

Reddit cybersecurity software developer

Information security analyst

Teach cyber security in high school

Youtube Analyst 

Journel 6:

 Cyber technology has created many different doors into workplace deviance. There are many different ways workplace deviance may happen but one possible way is if an upset employee decides one day to let the security systems go off and let attacks ensue. This is all due to the fact that this is happening through the internet and not face to face. It is much harder to detect these workplace deviance. Another example of workplace deviance is if a worker was not given a promotion and decides to download sensitive information on a hard drive and sell it. This type of workplace deviance can be devastating to businesses since the attack is happening inside the workplace. The worst part of this is how hard it can be to pursue these attackers. Since they happen in the workplace, it is easy to hide and lay low. Cyber technology is the reason why it is easy to lay low. It provides different methods to stay hidden behind a screen. Also, since technology is only getting newer, there will almost always be newer ways to hack and to stay hidden. There aren’t any security cameras to pinpoint when and where an attack occurred. Also some employees just spend most of their time going around the internet and this is called cyberloafing. This can have a negative impact on the business since instead of making sure the security system is ok , they are being negligent. Another form of cyber deviance is production and property deviance. Production deviance is behavior that a worker can show that negatively affects the entire work environment. Property deviance is when an employer’s property is damaged by a worker without permission. All of this is terrible for a workplace and should be dealt with. This is due to the situation possibly only getting worse.

Journel 7:

Journel 8:

Journal 9: How to tell if your computer is safe.

There are many different ways to see and detect if your computer is in fact safe or not. One of the easiest ways to detect this is by getting antivirus software to run a safety check on your computer. Doing so will check on your computer for any type of malware and how bad it is. But, some people don’t have access to this, so if your computer for some reason is running slower than it normally does, there is a possibility that your computer has been compromised. Checking to see if your computer crashes frequently is another great indicator of your computer being compromised. This is due to many malware causing your computer to slow down since it eats up memory. Also if your computer randomly starts shutting down and resetting, is another indication that a compromise has occurred. This and browser lag shows how bad the compromised computer could be. This and also if your computer’s fan is really loud and takes a while to load up, can show how much damage your computer has received from the malware. If you have detected any sort of malware, it is best to download an antivirus or an anti-malware software to detect the malware to possibly delete them from your computer. This is one of the best ways to take viruses from your computer but it is better to already have these software’s installed into your computer to prevent this from originally happening. Malware attacks are starting to become more frequent nowadays so it is smart to have it installed to prevent any malware attacks to your computer. If not, there is a chance that you can lose data or any downloaded items on your computer. It is best to do research before installing antivirus software because some are more efficient than others and more specific for certain computers.

Journel 9:

1. Describe three ways that computers have made the world safer and less safe.

Computers nowadays are everywhere. We even carry a portable computer on hand all the time. They are a concrete part of our lives now and have made life much safer but also more dangerous at the same time. One of the ways the world has become safer is efficient and fast communication. You can talk to anyone around the world with just wifi and a computer. You can even facetime on a computer to check up on your daughter or son. Also the wide variety of information we have now. If used properly and responsibly, you can almost learn anything from the internet. Not only this, but you can do college courses online. This can make it safer for people who are vulnerable to covid-19 or illness in general. What computers do that make the world unsafe is the dark web. There is no regulation there so criminal activity is rampant. This includes narco-trafficking, sex trafficking, and other crimes. Also, the internet makes kids more likely to be socially awkward. This is due to them constantly being on the screen and not in the real world. Also, hackers are out there and because of this people and institutions get hacked. This is a problem because some places have sensitive information like banks that can get bank accounts stolen or robbed of. But, the computer opened up cryptocurrency which is great at a time of inflation. But also it is easy to get robbed due to no regulation or laws since it is a very recent thing to pop up. Thus, most people get a ledger or an online wallet for your currency. This keeps your crypto currency safe from hackers attacking you to steal your currency. So computers have made the world a whole lot safer and much easier. But in return we are met with some dark spots and danger. It is best to not use the internet responsibly. 

Journel 13: How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

The short arm of predictive knowledge basically means the ethical viewpoint on looking at how no matter how hard we try to predict the future, we will never know it. Relating that to the development of cyber-policy and infrastructure. We will never know if anything in that infrastructure will get hacked or breached. There may be many different policies in place but this is not a 100 percent guarantee that nothing will happen. Because of this, policies and infrastructure should always be evaluated. The development of cyber policies should always be worked on because new problems tend to arise in technology frequently. Also, this can make it safer for users for example in Instagram or most recently in Facebook. It was recently discovered that these companies track our data and hold them in data storage. Because of this, many people feared that their info could be compromised and thus new policies were set in place to let people decide whether they are willing to let these companies have their data. This was only discovered after many years. These vulnerabilities should be checked over and have policies set in place to keep users safe. This is why the development of cyber policies should continue. For infracture it ties into cyber policies. This is due to it tying all the networks together. It literally holds the internet together. So infrastructure should definitely be updated constantly. There have been breaches in cyber infrastructure and these are grave to the internet and wherever it has affected. Imagine if a breach has been done in the Pentagon’s cyber infrastructure and their systems have been compromised. The whole country would be at risk because of this. Anything technological should be always updated constantly to make sure that there are not any breaches. The internet is new and growing so because of this there will always be a new way into breaching these systems.