e-Portfolio entry #6

How has cyber technology created opportunities for workplace deviance? Over the last few decades, major advancements have been made in technology, and as a direct result, cybercrime has developed into a challenging and consistent issue among society. Cyber attacks directed towards businesses have increased tremendously over the years, and even large scale corporations like Target…

e-Portfolio entry #5

Legal ways to make money using the letters for the word Cybersecurity Cybersecurity Analyst Yacht software that is secure Build an antivirus software Exploit a companies security protocol in order to help them improve. Reveal any weaknesses in a companies security system Security auditing Ethical Hacker Courses for Cybersecurity Uninstall any suspicious software or applications…

e-Portfolio Entry #4

Cybersecurity risks in the US vs the UK based on a 2022 Cybersecurity report: As far as business takeover attempts are concerned, the US experience more attempts, but the UK saw more successful criminal takeovers. 45% of US respondents saw outside parties attempt to manipulate employees through phishing attempts, but only 27% of those attempts…

e-Portfolio Entry #3

Describe 4 ethical issues that arise when storing electronic information about individuals.

e-Portfolio Entry #2

Cybersecurity is an interdisciplinary field of study, meaning there are multiple fields of knowledge that relate to it. There are several different majors that ODU offers that work hand in hand with Cybersecurity. The first major that comes to mind is Criminology. Last semester, I was able to take the introductory course for Criminology, and…

e-Portfolio entry #1

With each year that passes by, America as a nation becomes more and more dependent on technology. While computers, smart phones, and other advanced forms of technology certainly have many benefits, they also have their risks and dangers. Many people use online websites to shop, communicate, and even work, and some of these web applications…