Journal Entry 6

Cyber security allows for many ways that deviancy in the workplace can take place, just as any company has to deal with it no matter their occupation or what services they provide. Cyber security professionals, especially those with top-level security clearance have access to terabytes, even more information pertaining to a company and its assets, employees, consumers, etc. For instance, you look at Edward Snowden who had access to critical and top-secret information of our company and once he learned of certain intentions of his employer, our government, he decided to act upon this by disclosing a lot of information from the inside, questioning the integrity of our government and its security. That example is a bit unorthodox but the same rules still apply. Disgruntled employees who aren’t happy at their place of work or former employees who have personal vendettas against their employers may use their knowledge of the networks or systems they worked under to target critical infrastructure or leaked secure information. Companies put cyber security professionals through rigorous testing and uphold the highest of standards for their employees so that they can safely and securely use the systems as well as maintain their integrity of them if they were to part ways. Any point in which someone can abuse a system through unethical means could be devastating to a company, small or large, with some in extreme circumstances going completely out of business. Outside of disgruntled employees could be opportunities that one finds while working within the networks. Maybe a contact of theirs is offering money that is irresistible to someone who is going through rough times or simply is greedy. Maybe their own information is at stake and it is being held for ransom in exchange for access to secure information or their skills to hack a network. Therefore workplace deviance in cyber security can have instances where means of profit, revenge, personal beliefs, and or personal security are attributed to its occurrence.

Leave a Reply

Your email address will not be published. Required fields are marked *