Modules

Google

After spending 15 minutes googling myself and in different variations, from HS and college to city and location, to even nicknames. Fortunately, I suppose my name, or last name I should say, is pretty common. You do however, stumble upon my LinkedIn which in turn can be associated to my other sites and contact information. But for the most part, other people come up when googling Syed Baker

Entry 1

My major is Public Health and my desire is to help people, whether individually or in vast groups. It relates to cybersecurity in many aspects, for instance you need to protect the data and research and information and manage it. Cybersecurity helps create a framework and infrastructure to help prevent cyber attacks on the systems and networks.

Some other majors offered at ODU that relate to cybersecurity include Information Technology and Engineering. Information Technology being a huge aspect of cybersecurity in regards to compliance and security of data and systems to ensure all data is readily available.

Entry 2

There are many advantages of storing information electronically such as saving resources, space, and security, but likewise there are complications and issues that arise too. For one, a lot of information is stored in patient files, including age, sex, race, medical issues, and more and there is a big risk in data leaking because of accidental disclosures or hackers. The same goes for banking and finance industry, a lot of private information including social security or bank account/credit card information can be found or stolen. Ensuring the right user gets access is another ethical issue, who gets the right to enter the files and information and view it. Copyright infringement is another issues that arises with information technology, the law can be manipulated and information can be amended or revised and taken from one another. People will aim to steal your ideas and work and legally copyright and claim it as theirs, thus inhibiting you from getting any attachments to your line of business. Trade secrets is also a significant ethical issues in information technology as they usually secure something of high value or usefulness, once disclosed the secret is lost and can only be protected by the law in regards to use. If leaked, it can provide a significant head start in the advancement of software or hardware.

Cyber security risk is different in all aspects in the world, and each country has something that they need to work on. The US alone has now dropped from fifth to 17th as the most cyber-secure country. Out of 76 countries being observed, findings have found that Denmark is the most cyber-secure country in the world and Algeria is ranked as the worst cyber-secure country, this being due to lack of legislations concerning privacy. Other countries came in with high scores such as China with the most telnet attacks and Belarus with the most financial malware attacks.

Entry 3

Cyber technologies have created opportunities for workplace deviance in many ways, from hacking private information, to damaging an organization, and more. Workplace deviance is when deliberate, malicious attempts to sabotage an organization by causing problems in the workplace. This can be caused by job stressors, organizational frustration, lack of control in the work environment, downsizing, and more. Employees now have been caught with excessive use of the internet for non-work related activities such as online shopping and surfing the web and this is not only stealing time and money from the company but as well increasing workplace deviance. It can also occur when an employee gets fired or disgruntled and their access rights to the company’s information has not been revoked, thus the former employee can cause harm by stealing data and giving it to its’ competitors.

Data is so important nowadays, that it can be worth a lot of money to some people, especially information of important people like CEOs and politicians, Data can be copied and go undetected by employers, it is hard to see if a user has taken the information. Studies show that they are typically committed by a mentally stable employee who may exhibit emotions such as anger or resentment and are sporadic in nature. Cybersecurity is needed to ensure this doesn’t happen and that information can be protected to reduce workplace deviance. Tools to help prevent is to ensure correct access rights, protect information with firewalls and physical protection, and monitor important data.

Entry 4

Cyber security programs have many advantages to them of course, but there are also costs that come with them. Depending on the size and scope of your business and how many securities measure you want to have, it can definitely add up in terms of costs. Of course, the benefit being your information and client’s information is protected and money and other data can’t be stolen or altered. A major challenge is carefully defining costs and benefits, a CEO might not want to invest in a new firewall if the justification is that it will increase throughput of traffic. Conducting an analysis of your systems and finding out where your weakness and threats are helps better assess what type of cyber security your organization or business will need. The investment in cyber security must be justified, especially in the benefits it brings to the organization. For compliance and audit reasons, a company must prove that the security measures with the regulatory requirements. Likewise, you must protect the loss of business, brand damage, or share hold value. As mentioned earlier, doing a cost-benefit analysis of cyber security products and solutions helps evaluate projects and its cost and benefits. Of course, this is depending on the type and size of the organization as they’re measured by investments needed for cyber security. You can tell if your computer is safe through testing of viruses and hacker attacks, if they are not able to access your computer, than it is considered protected and safe. Of course, a lot of hackers attack you without you even knowing, so ensuring you have virus protection, firewalls, physical barriers, and passwords help ensure your computer is protected. Encrypting important data and putting them in secure locations such as personal information, passwords, bank accounts and more help further improve security and safety of your computer.