Journal #5

I believe that, as more of our daily lives heavily involve and depend of technology, computers have overall improved the safety of our world and improved our quality of life. One vial aspect of human existence is education. Not just formal education, but also the expansive amount of knowledge that technology has allowed us to…

Journal #4

Developing a cyber security program for a business is immensely beneficial. Though most would turn their heads at the thought of delegating a good portion of funding for non-physical protection methods, these non-physical assets are often the ones in most need for protection. For a business, one of the most valuable properties they have is…

Journal #3

Deviance in the technological world, and by extension the realm of cybersecurity, is seen much more than in in-person interactions due to the anonymous detached nature of the internet. In addition, when a person is in a cybersecurity work environment, they’re learning and gaining knowledge about the intricacies of cybercrime. They are learning the methods…

Journal #2

Privacy and confidentiality Every citizen has the innate right to having personal information about themselves hidden from others. The citizen’s personal information should only be shared with whom they give access to with clear consent. In instances where the citizen is unable to give clear consent, whether that be from lack of presence/communication, mental inability,…

Journal #1

My major is Cybersecurity; therefore, cybersecurity technology is an imperative component to my major if not my major entirely. Cybersecurity involves the process of protecting networks, devices, data, etc. from attacks or breaching through bodies of technology. This is essentially what cybersecurity technology is as well. Computer Science encompasses Cybersecurity completely due to its comprehensive…