Week 3

Storing electronic information about individuals creates various ethical considerations since it requires the collection, management, and protection of personal data. The 4 moral problems surround the retention of personal electronic data are Privacy and Confidentiality, Data Security and Breaches, Data Accuracy and Integrity, and Data Ownership and Consent.  One problem for Privacy and Confidentiality is…

Week 2

4 other majors that helps or supports cybersecurity in Old Dominion University are Computer Science, Information Systems and Technology, Electric Engineering, and Criminal Justice. Computer Science helps by providing a strong foundation in programming, algorithms, and software development. Cybersecurity heavily relies on understanding software vulnerabilities, coding practices, and creating secure systems. Programming Skills are used…

Introduction

I’m interested in cybersecurity technology because I’ve always been the gadget type person in my family. My mom was born in 1987 then had me in 2004 so technology was only just beginning at the time. She never really understood technology at first but when I was younger, I understood more than anything at the…