#8
1. How can you tell if your computer is safe? You can tell if your computer is safe by making sure you follow the proper precautions of safe computer and internet use in order to make sure you aren’t exposing your computer to undue risk. You need to make sure you have an antivirus software installed so your computer can scan and defend itself from attacks and viruses. You need to make sure your software and operating systems are fully up to date to prevent security holes that could allow a virus or hacker entrance into your device. Updating to a version of software that is...
Read More#7
1. What are the costs and benefits of developing cybersecurity programs in business? The cost and benefits of developing cyber security programs in a business can be expensive and time consuming but extremely worth it. First the company needs to do its research on Which Cyber Security Program and provider they want to go with and what type of cyber security program would suit their company the best. Then they need to look at cost and submit that for review and have a meeting to approve their choice, then they have to coordinate with the company they chose for an installation, then...
Read More#6
How has cyber technology created opportunities for workplace deviance? Deviance is the state of departing from usual or accepted standards. Cyber technology has created the opportunity for workplace deviance because it is a tool. A tool that is used by the majority of people in this modern world. Cyber technology is needed everywhere and can be expensive for a company and since people already have technology, systems like Bring Your Own Device were implemented. When a business allows its employees to bring their own device for work they can run into a temptation or opportunity for workplace...
Read More#5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. C- Computer patching Y- Yield positive results in counteracting cyber attacksB- Better a business security templateE- Eliminate viruses from computers.R- Re image computers (safe cyber practice when you plug drives in) S- Secure a companies’ computersE- Educate others on cyber security practicesC- Code commands to give only appropriate users admin rightsU- Use safe computer practices in your jobR- Reconfigure sites with weak points that can be exploited.I- Integrate Cyber practices into a...
Read More#4
Compare cybersecurity risks in the U.S. and another country. Symantec has created an index of cyber crime activities that include hosting malware, botnets, phishing, server hosting, and how many botnet command and control servers there are within each nation. The top five nations on this index include the US, China, Brazil, Germany, and India. Russia is the seventh. The top countries to host botnets, which are often used to send spam emails, are Vietnam, China, Russia, and India. The United States is targeted the most by phishing attacks, suffering 60% of worldwide phishing volume. The top...
Read More