{"id":256,"date":"2022-12-09T21:02:34","date_gmt":"2022-12-09T21:02:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/?p=256"},"modified":"2022-12-09T21:02:37","modified_gmt":"2022-12-09T21:02:37","slug":"cyse-assignment-3-how-has-cybersecurity-created-opportunities-for-workplace-deviance","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/2022\/12\/09\/cyse-assignment-3-how-has-cybersecurity-created-opportunities-for-workplace-deviance\/","title":{"rendered":"CYSE Assignment #3 &#8211; How has cybersecurity created opportunities for workplace deviance?"},"content":{"rendered":"\n<p>With any security protocols implemented, there&#8217;s always going to be bad actors taking it as a challenge. There&#8217;s always a risk in taking on new employees and giving them access to information systems within companies. They can sign waivers and agreements promising to be honest and protect company trade secrets, but ultimately it is an honor code arrangement. You won\u2019t believe some of the ways people have abused online database systems.<\/p>\n\n\n\n<p>Four years ago, I worked at a call center that did tech support for a cable company and we heard the story of an elderly woman who worked the phones. You couldn\u2019t have pens, paper, cellphones, or books with you on the call center floor (for obvious reasons) but you could bring along your knitting or crocheting to do while you talked customers through troubleshooting. This woman, honest-to-God, recorded credit and debit card numbers with her <em>knitting stitches<\/em>. After all, you wouldn\u2019t suspect a sweet old grandmother of credit card fraud!<\/p>\n\n\n\n<p>You need to be careful when inputting data into computers, especially in public settings. Social engineering techniques don\u2019t just happen online, they happen in your physical surroundings. Always be wary of people standing behind you while you\u2019re typing personal information into a computer. Shoulder surfing involves someone looking over a person\u2019s shoulder as they\u2019re inputting information and remembering email addresses, names, even keystrokes for passwords. This is why offices have bullpens and dividers and why computers are positioned in ways that aren\u2019t easily viewable by passersby. Many business environments have strict rules against employees having cellphones on the workplace floor. Yes, it\u2019s tedious and sometimes inconvenient, but the rules exist because people have done illegal things, like taking photos of credit cards and using skimmers. Maybe the business implements these rules to protect themselves from liability more than protecting their employees, but it\u2019s better than nothing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With any security protocols implemented, there&#8217;s always going to be bad actors taking it as a challenge. There&#8217;s always a risk in taking on new employees and giving them access to information systems within companies. They can sign waivers and agreements promising to be honest and protect company trade secrets, but ultimately it is an &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/chelseaturner029\/2022\/12\/09\/cyse-assignment-3-how-has-cybersecurity-created-opportunities-for-workplace-deviance\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE Assignment #3 &#8211; How has cybersecurity created opportunities for workplace deviance?<\/span><\/a><\/p>\n","protected":false},"author":22819,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/posts\/256"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/users\/22819"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/comments?post=256"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/posts\/256\/revisions"}],"predecessor-version":[{"id":257,"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/posts\/256\/revisions\/257"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/media?parent=256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/categories?post=256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/tags?post=256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}