#7
1. What are the costs and benefits of developing cybersecurity programs in business? The cost and benefits of developing cyber security programs in a business can be expensive and time consuming but extremely worth it. First the company needs to do its research on Which Cyber Security Program and provider they want to go with and what type of cyber security program would suit their company the best. Then they need to look at cost and submit that for review and have a meeting to approve their choice, then they have to coordinate with the company they chose for an installation, then...
Read More#6
How has cyber technology created opportunities for workplace deviance? Deviance is the state of departing from usual or accepted standards. Cyber technology has created the opportunity for workplace deviance because it is a tool. A tool that is used by the majority of people in this modern world. Cyber technology is needed everywhere and can be expensive for a company and since people already have technology, systems like Bring Your Own Device were implemented. When a business allows its employees to bring their own device for work they can run into a temptation or opportunity for workplace...
Read More#5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. C- Computer patching Y- Yield positive results in counteracting cyber attacksB- Better a business security templateE- Eliminate viruses from computers.R- Re image computers (safe cyber practice when you plug drives in) S- Secure a companies’ computersE- Educate others on cyber security practicesC- Code commands to give only appropriate users admin rightsU- Use safe computer practices in your jobR- Reconfigure sites with weak points that can be exploited.I- Integrate Cyber practices into a...
Read More#4
Compare cybersecurity risks in the U.S. and another country. Symantec has created an index of cyber crime activities that include hosting malware, botnets, phishing, server hosting, and how many botnet command and control servers there are within each nation. The top five nations on this index include the US, China, Brazil, Germany, and India. Russia is the seventh. The top countries to host botnets, which are often used to send spam emails, are Vietnam, China, Russia, and India. The United States is targeted the most by phishing attacks, suffering 60% of worldwide phishing volume. The top...
Read More#3
Describe four ethical issues that arise when storing electronic information about individuals. Consent: when it comes to gathering data a person needs to agree to the data being collected. Otherwise can’t it be considered spying? Even if it’s not illegal a person wants their privacy even if the data being gathered isn’t significant or endangering to the person. information as small as their dog’s name and how many kids they have can be later used to build a profile on them that gets stolen by hackers and used to break into their accounts or impersonate them.safe data...
Read More#2
-Select four other majors offered by ODU and explain how those majors relate to cybersecurity Criminal Justice: is related to cyber security because it teaches what is legal and what isn’t and what society’s response to those laws and infractions are. Cyber security implements a lot of these rules for the internet because there are no police for the internet. Therefore we need to learn the rules and laws of interaction and privacy in order to enforce them. We need criminal justice because without this interdisciplinary knowledge we wouldn’t know what we were protecting and what...
Read More