Cybersecurity, Technology, and Society
The course gave me an experience that I found very interesting and I learned quite a bit from it. The gist of the course was to look into how cybersecurity is looked upon in an interdisciplinary way, working out how the world is impacted by cybersecurity and events that happen in the cyber world. It involves cyber issues that involve politics, ethicality, and legal issues. The assignment that stood out to me was a journal post I wrote about storing information about individuals. It was about how there can be ethical issues when storing data for your customers, especially with consent. I wrote about how companies could be very sketchy if they store your data without your consent and how that’s a potential breach of privacy since they’re also selling it for revenue. I also wrote about the current problems that the cyberworld and real world companies face in the modern day, such as talking about ransomware being the most common attack in the world and how much of a security risk that cryptojacking is since it takes up computer resources to mine Bitcoin.
The skills that I gained from this course and assignment were that I could apply what I learned and typed about in this course in the future with my job in the field. It reminds me that I should take heavy consideration into making sure the company I work for asks for consent when regarding personal data and protecting against cyber attacks. I also learned that the cyber world is all about trust and learning. Working in this class showed me that it’s best to be organized and have as much knowledge of the field as possible because if you don’t have as much knowledge, it can really hurt the company you work for. This course showed me that knowledge is what helps keep your company’s security at a good level because if you have a bunch of people that have no knowledge on the security, then what’s the point of having the cyber team at all unless you give them that knowledge that can keep things afloat.
It allowed me to learn that organization is key because when you have your customers’ consent because if you need to have their data at the ready, it’ll make it so much easier to work with whereas if you had everything disorganized, it would make yours and your customer’s life a lot harder than it needs to be. It also helped me learn that consent and privacy are very important, especially when it involves keeping the trust of your user base and employers. Trustworthiness is something that I think will get me far in life when it comes to employers and keeping the data of the customers safe. This course also helped me learn that knowledge is more important than trying to deck out your gear because it’s better to know what you’re doing rather than having all of this expensive top notch equipment and not knowing how to use it at all. This experience helps with my personal life because trustworthiness can help a lot when trying to get people to like you, as well as respecting their privacy. It will also allow me to balance my choices and spending because of what I feel works best via organization and budgeting.
Artifacts that I plan to use when I set up my page are the journal pages that I wrote about during my class time there. I chose them because they accurately represent what I’ve learned about in the class based on the responses I gave in them. In the journals, I was given a topic to write about and I answered them based on research and what I felt about each topic, giving my own insight on each of the journals. They’re worth including to me because they’re the main source of how I learned what I could in my time with the class.
- Journal 7Cyber technology impacts interactions between offenders and victims by proving that an offender that’s smart can constantly perform the offenses if they have the ability to. It makes it easier for the offenders and harder for the victims because it’s most of the time performed anonymously, so nobody will know who was doing it unless…
- Journal 6Engineers are generally part of the backbone of the cyber world within companies. They add to the strength of the cyber team and can provide all of the things necessary to setting up a super strong network. They can set up many different components while also looking for the most optimal choices for the networks,…
- Journal #5I can tell that my computer is safe by checking for antiviruses and antimalware. Making sure my passwords are strong and I have sensitive files in folders that are locked up. If my router has a strong password, I’ll know that attackers will have a hard time trying to get in from the outside and…
- Journal #4There are many things that are important in a business and cybersecurity is one of them that’s considered the most important. The cost of it may not be the best, but it can really help in the long run. It can usually cost a business about $1300 to $3000 per employee if they’re full-time. Giving…
- Journal #3Cyber technology has created opportunities for workplace deviance by giving people a chance to perform deviant acts without even putting their hands on anything that’s not theirs. People can make viruses or malware and infect an entire company’s system all because they didn’t get employee of the month or a raise that they asked for….
- Journal #2When it comes to storing information about individuals, there can be come ethical problems within it. One of them is making sure you have the consent of the users who have plans to be part of your system. If there’s no evidence that you asked for consent before storing their data, it may give them…
- Journal #1I’m interested in cybersecurity technology because it always interests me as there’s so many types of technology coming out at such a rapid rate. Watching things get created and seeing how little everything on the motherboards is always a sight to see because of how much better things are becoming for the technological world. Hearing…