STG(Security Technology Group) Cam Chronister Cyse 368 Fall 2022 Table of contents Introduction to the company and what to expect… Pg 1 Easing into the worklife and duties… Pg 2 How my expectations played out in reality… PG 3 Exciting and discouraging parts of internship… Pg 4 Challenging aspects of the internship… Pg 5…
#7
Cyber technology has impacted the relationship between offenders and victims by not doing something physical to harm someone. With the power of the internet, anything can be shared in a matter of seconds and one single tap of the finger. If someone has a problem with something or another person, they can turn to social…
#6
Cyber technology has impacted the relationship between offenders and victims by not doing something physical to harm someone. With the power of the internet, anything can be shared in a matter of seconds and one single tap of the finger. If someone has a problem with something or another person, they can turn to social…
journal #5
Computers have many different tasks and what not. One of their main tasks is safety and protection. Computers have been around for ages, therefore evolving over time with the new discoveries within technology. Computers have made the humankind safer by being able to store important information and documentations that people cannot protect themselves. Computers contain…
journal #4
There are many pros and cons of developing a cybersecurity program in a business. A few pros are enhanced computer skills, top notch security experts, advanced protection, and many more. Some cons can include paying an expert to teach his skills to fellow employees, finding a trustworthy group of people to control the program. Now…
pt 2 3/27/31
Cyber technology has caused problems in workplace environments for many years now. For every good thing with technology comes with a few bad/harmful things. With technology advancing every day, that opens up more opportunities for hackers/criminals to execute an attack. Banks, major corporations, and many more businesses are a target for criminals, there’s always going…
Free write 3/27/2021
Create app that rates software Yacht GPS software that is secure Bug Ethical hacking Recaptcha Software Eliminating threats Catfishing Unprotected device Ransomware Identity threat Two-factor authentication Y2k
journal #2
Security issues can play a big factor into trusting someone to keep personal information about yourself. For example, if there is a security breach in the system, all of your information was just now stolen and could possibly be used for harmful things. Doctors office and Banks are a primary target for hackers to want…
About me google activity
When I googled myself, I found my social media accounts. Some pictures of me on the web. I also found my information on maxpreps from when I played baseball in highschool, I also found stuff related to my dad since he is a top realtor in the area where we live.
Journal#1
My major is cybersecurity, so it relates to the major in every aspect. Criminal justice, another class I am taking this semester, relates to cybersecurity in persecution in law if there is a law broken and the process an individual would have to go through, either internet crime or a physical crime that they committed….