An engineer’s role in the cybersecurity field is to implement various methods to ensure the security of cyber networks. Each method does a specific task within that network. The first method is Firewalls which can be understood as the controller of both incoming and outgoing traffic in the network. Another method, similar to Firewalls, is…
Entry #5
In order for a computer to be considered “safe,” there needs to be security measures in place for it to have that label. Additionally, the level of security on that computer depends on the number of safety measures that are placed on it. In other words, the more protective actions on the computer the safer…
Entry #4
When trying to create a successful business, there needs to be a cybersecurity program in place to protect all assets within that business. Along with designing a cybersecurity program comes with both costs and benefits. The most notable cost for a program being the financial investment that is required to have effective security. Like everything…
Entry #3
When cyber technology entered the workplace, it came with upsides and downsides. One of them downsides being opportunities workplace deviance. Workplace deviance can be defined as a person’s desire to act outside of what is considered “normal behavior” and to harm the well-being of an organization. A common reason for this type of behavior is…
Entry #2
There is quite a lengthy list of ethical issues that arise when storing electronic information about individuals. Four ethical issues that immediately come to mind are privacy, data security, consent, and control their own data. Two of these issues, privacy, and data security, go hand in hand with each other. The ethical issue with privacy…
Entry #1
Since I was a little kid, I have always really been interested in technology as a whole. A lot of that interest came from playing video games on a gaming system, or having the newest iPhone that came out just about each year. Honestly, any type of technology that I could get my hands always…