Computers: Safe/Unsafe

Computers have done a lot for the world since their conception. The use of computers has advanced how we communicated and how fast information travels. Before computers society relied on the use of phones which not everyone had access to and courier services moving information by planes, trains, and automobiles. With the ability for information…

Criminal Justice and Cybercrime

Criminal justice and cybercrime overlap as each practice is related to crime and laws. Depending on schools it is now an elective or requirement to take a course related to cybercrime. Technology is growing at an exponential rate and with that comes an increase in cybercrime. Therefore, it has become exceedingly important for criminal justice…

Engineers and Safer Networks

Cybersecurity framework is used to integrate industry standards and best practices to help manage cybersecurity risks for different organizations. This framework is important for organizations to understand the ever-changing cybersecurity risks and threats. Organizations can also use this framework to help them respond and recover from incidents that arise, while also helping them to analyze how…

Workplace Deviance

The information security triad involves confidentiality, integrity, and availability. Confidentiality involves the limiting access to information to those who need to know or have specific privileges to view it. Integrity within the security triad relates to ensuring the data access by those who availability to is not altered or misrepresented. Lastly, we have availability which…

Money & Cybersecurity

Create app that rates software.Yacht GPS software that is secureBlue team careerEntry level analystRed team careerSecuring systemsEnterprise security expertConsultingUnderstanding networkingRisk managementIdentify and defend against attacksTeach cyber hygieneYouth technology teacher

Ethical Issues

In my opinion the largest risks and challenges revolve around data security and making the internet available to everyone who needs it. Several of the risks we have today regarding information safety and storage. Before IoT documents for record keeping were kept in filing cabinets, etc. Therefore, the only worries were the potential hazards such…

Cybersecurity Risks

One of the key trends in identity management is the adoption of biometrics to secure accounts. In the IBM article it discussed how the US lags behind other geographical locations such as APAC and Europe when it comes to the use of biometrics as an authentication method. On a cultural level the mentioned places outside…

Cybersecurity Disciplines

Cybersecurity is related to several different disciplines within ODU’s degree programs. The psychology degree program relates to the people who are creating cybersecurity events. It is important to learn how cyber criminals think and what motivates them to prey on their victims. Knowing their motivations will give insight to who they will attack next and…

Why Cyber Technology?

Cybersecurity technology is extremely fascinating to me for several reasons. I initially became interested in cybersecurity due to my interest in a career change. Careers in cybersecurity are growing at an exponential rate especially in the DC, Maryland, Virginia area due to all the government agencies and contractors. Companies are constantly looking for ways to…