CYSE 200T Journal #13

Cybersecurity is an ever-evolving entity that consequently requires new and updated cyber policies and infrastructures. When considering the development of cyber policy and infrastructure coupled with the “short arm” of predictive knowledge, it could be beneficial to plan and develop only for what we do know. We can try our best to forecast or predict…

CYSE 200T Journal #12

As cyber technology has become more integrated into our everyday lives there is bound to be both positive and negative impacts such as the increase in cybercrime. There has been a significant shift in the way we see crime from before and after technology was introduced. Previously, the only way for a criminal to steal…

CYSE 200T Journal #11

Studying cybersecurity undoubtedly requires an interdisciplinary approach and viewpoint that includes the study of criminal justice and criminology. Cybercrime is a class of crime that utilizes the exploitation of computers, technology, and the internet to carry out illegal acts. In module 2, it was discussed that criminology and criminal justice raise the questions that cover…

CYSE 200T Journal #10

As with anything cyber related, cyber networks require continuous updates and developments in order to continue prioritizing their security. Cybersecurity is a ever-evolving industry that will always have need of continuous learning. Moreover, as a simple definition, engineers are tasked with solving problems within, creating and maintaining systems using scientific knowledge. In specific, network security…

CYSE 200T Journal #9

Technology and computers have both made the world safer and less safe for different reasons. Technology is so integrated into our everyday lives now, and it provides a lot of ease and modern day conveniences that we didn’t once have. Some examples of how computers have made the world safer could include the use of…

CYSE 200T Journal #8

How can you tell if your computer is safe? The first and most simple way to ensure that your computer is safe, is to run a full system scan using anti-virus software; It is also important to keep anti-virus software up to date to ensure that it is catching the newest viruses. If an individual…

CYSE 200T Journal #7

Investing in a cybersecurity program is likely a smart move for almost all businesses, and should not be overlooked. The implementation of a cybersecurity program comes with its costs and benefits, which need to be weighed by the company or business to decide if its worth their time, effort, and money. The first cost of…

CYSE 200T Journal #6

Workplace deviance in this discussion will be defined as the intentional act of and desire to bring harm or damage upon one’s own workplace. Cyber technology has created more opportunities for individuals who might be motivated financially or by personal vendetta to cause damage to their workplace. A common situation that incorporates the use of…

CYSE 200T Journal #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Create app that rates software. Yacht GPS software that is secure. Build a cybersecurity application. Ethical hacking. Research and development. Security auditing. Entrepreneur(create your own cybersecurity company). Create training courses. Unauthorized access prevention. Risk assessment for a company. Incident…

CYSE 200T Journal #4

A cybersecurity risk is the potential damage, loss, or exposure an organization or company is facing due to a cyber attack. Data breaches are one of the biggest challenges the United States is confronted with in regards to cybersecurity risks. There isn’t one country that isn’t vulnerable to cyber attacks; the U.S. and Iran face…