Journal #13

Policies in cybersecurity are described as a set of rules and guidelines determined by agencies to ensure a company or organization complies with data security regulations and standards. These policies are essential for critical infrastructure. A significant cyber attack against these targets can devastate many people’s lives because they may be unable to access necessities…

Journal #12

Society has become increasingly intertwined with technology to the point that most people rely on it to perform daily tasks. These advancements have greatly improved the average life expectancy and, even more so, quality of life. Unfortunately, the technology people use daily has vulnerabilities that potential attackers can exploit. While there are steps that organizations…

Journal #11

The overlap between criminal justice and cybercrime lies primarily in that criminal justice is centered around crime, and cybercrimes are becoming increasingly prevalent. With technology becoming integrated with everyday life, criminals have found new ways to commit crimes. For example, rather than physically robbing a bank or other business poses far more risk than if…

Journal #10

Engineers make cyber networks safer by building new, more secure networks that a more difficult for an attacker to compromise. The main goal of the engineers is to prevent unauthorized users from accessing networks while making the interface streamlined and intuitive for authorized users. Ensuring the security of cyber networks is crucial, as failure to…

Journal #9

Computers have had a significant effect on humanity and have made life both less and more safe in different ways. An example of how computers have made the world safer is the technology that allows potentially dangerous individuals to be identified via AI facial recognition software. The ability to remotely spot a potential threat over…

Journal #8

While it is impossible to have a completely safe computer that retains any reasonable amount of functionality, there are several steps that an individual should take to ensure that their computer is secure and performing at an optimal level. Assuming that the computer in question is running a windows operating system, many steps can be…

Journal #7

While the development of cybersecurity programs in business is by no means inexpensive, the benefits exponentially outway the costs. While cybersecurity solutions are expensive, a data breach or other cyber event will cost an organization far more than implementing cybersecurity programs. A cyberattack can sometimes be significant enough to permanently damage an organization’s reputation or…

Journal #6

The constant evolution of technology has significantly increased the potential for workplace deviance and the potential severity resulting from these malicious actions. There are several potential motivators for workplace deviance, such as an employee becoming disgruntled because of being fired, reprimanded, or otherwise dissatisfied with the company. Technology has made deviance significantly easier and harder…

Journal #5

Consult for a company or organization YouTube videos that inform viewers about online security and safety. Blog about cyber security Ethical hacking Review software security Selling data protection Examine a corporation in preparation for an audit Create a security start up company Utilize freelancer bounties set by originations Research previous cyber events within an organization…

Journal #4

When choosing a country to compare to the United States regarding cybersecurity risks, South Sudan stood out from other countries as it appears at the bottom of the NCIS list. While the United States has relatively high cybercrime, it also has the necessary infrastructure to protect itself against cyber threats. A significant reason that the…

Journal #3

Four potential ethical issues that arise when digitally storing information about an individual or individuals are privacy and confidentiality, the integrity of stored data, the efficiency of implementation, and data breaches or leaks. When an organization stores an individual’s private information, it is the organization’s responsibility to ensure the information remains confidential and the individual’s…

Journal #2

Four majors related to cyber security offered by ODU are computer science, Computer engineering, Information technology, and criminal justice. Computer science and cyber security are very similar, as cyber security is a subfield of computer science. While cyber security focuses primarily on protecting networks or devices that could be vulnerable to attack, computer science is…

Journal #1

I am interested in cybersecurity for various reasons, a significant reason being that daily life has become increasingly intertwined with technology, leading to many potential opportunities for malicious activity that can disrupt our way of life. Many live their lives oblivious or simply ignoring that they are constantly under threat of cyberattacks, and steps should…