CYSE 200 – Discussion 3

How has cyber technology created opportunities for workplace deviance?

Cyber technology created opportunities for workplace deviance. This is especially true as technology is becoming more prevalent and user friendly. While some employees may engage in deviance without expecting harm to be caused, other employees may engage in deviance with malicious intent.
An employee may decide they would like to listen to YouTube while working, but it may be blocked by IT. The employee may then decide to just disable their firewall and attempt to access YouTube again. Even though the employee just wanted to listen to music, they now just opened their device to threats that IT was preventing with the firewall. If the employee’s device does come across threats, these threats now have access to the company’s network. Another example of an employee being deviant without meaning to cause harm could be sending a work related email through personal email instead of the secure and encrypted work network email. An employee may decide that they would like to do some work at home and decide to email their personal email with the work attached. If their personal email doesn’t offer encryption though, then the work information sent is now vulnerable and in plaintext. Even though the employee meant no harm, their deviant act can still cause harm.
An employee may decide to engage in deviant behavior with malicious intent. For instance, an employee may decide to check if their login credentials still work after being let go. If IT hasn’t properly removed access, then this employee may use their login capability to compromise the system and possibly even the entire network. Another instance could include an employee bringing a personal device into the office and connecting to the network to alter and add privileges on their work account. The employee could achieve this by using Kali on their personal device to gain access into an administrator account. This means that the employee now has unauthorized access to any file or application within the company, and the employee can cause much harm to the company.

Leave a Reply

Your email address will not be published. Required fields are marked *