The United States is the second most likely country, behind China, to be the victim of malicious cyber activity. The most likely candidate is China. I will speak about the United States before China. The United States is a huge, industrialized country with a strong reliance on the Internet. Because of its reliance on the…
Author: catki011
Journal #3
When a company is in possession of personal information about a customer, such information has a duty of confidentiality toward both the company and the customer. It is immoral for hackers and thieves in today’s environment to try to steal information such as medical records, credit card information, Social Security numbers, and other personal information….
Journal #2
ODU offers four Majors which has similar characteristics in Cybersecurity. Those are Computer Science, Master of Science in Cybersecurity, Cyber Operations, and CyberCrime. First, Cyber Operations. Cyber activities is an interdisciplinary major that covers the full extent of cyberspace and related operations, both technological and non-technical (ethical, legal, human-centered, etc.). Cyber Operations is a discipline…
Journal #1
When I first attended TCC, they didn’t have a music production class, so I took Cybersecurity as my major instead. Since then, I’ve been interested in Cybersecurity as a whole, and I’ve described myself as a kid in a candy shop with all the many different areas in Cybersecurity. Another reason why I am interested…