Entry 6

Engineers make cyber networks safer by developing a secure trustworthy system that meets the stakeholders needs depending on mission, business, and array of other objectives and concerns. Today’s systems are more complex and ever evolving and security engineers must manage this and attain a level of confidence or know-how and design in order for a…

Entry 5

You can tell a computer is safe by scanning it frequently, having up to date anti-virus software, correct privacy settings throughout applications, updated system software, and testing your firewall. Also, deleting junk files or old files that are no longer necessary but contain sensitive information. Just having all of that doesn’t always ensure your computer…

Entry 4

Entry 4 The costs and benefits of developing a cybersecurity program within a business vary from company to company. Cost is also dependent on the budget the company cuts out for cybersecurity, which makes it difficult for CISOs to give businesses a percentage to cut out. However, there are five main categories all organizations can…

Entry 3

Cyber technology has created opportunities for workplace deviance by giving a user too much access to certain programs, technologies, or applications. Depending on the level of trust or level of cybersecurity from the workplace, an employee can easily use a work computer as a home or personal computer. This opens many avenues for cyber threats…

Entry 2

            Four ethical issues that arise when storing data electronically for employees, customers, patients, or people in general are privacy, security, confidentiality, and inaccurate data. With data privacy, it used to be as simple as storing a physical sheet of paper in a locked file cabinet. Now with everything online it’s all in one place….

Entry 1                 Why am I interested in cybersecurity technology? I am interested in cybersecurity technology because I have always wondered how computers operate and how they can be manipulated, but, most importantly, protected from threats. I’ve also found it interesting just how much software and hardware have evolved in the last few decades since…