Blog

Journal Entry #12

Posted by on 1:35 am in Uncategorized | 0 comments

There has been an increase in internet crime within the U.S. The consequences of a cyberattack can include financial losses, theft of property, and loss of consumer confidence and trust. The monetary impact has been estimated to be billions of dollars a year. With the foremost common sorts of cybercrime being phishing and fraud, there has been and continues to be an overload of victims. Victims of these cases can feel violated love it may be a physical attack. Many victims reported psychological impacts like anger, anxiety, fear, isolation,...

read more

Journal Entry #3

Posted by on 1:16 am in Uncategorized | 0 comments

Four ethical issues that arise when storing electronic information about individuals are privacy and confidentiality, security breaches, system implementation, and data inaccuracies.  Privacy and confidentiality can be used interchangeably.  However, privacy means the state or condition of being free from being observed or disturbed by other people.  Confidentiality means the state of keeping or being kept secret or private.  The importance of confidentiality is that it helps to build and develop trust.  Privacy eliminates judgement and gives...

read more

Journal Entry #10

Posted by on 7:38 am in Uncategorized | 0 comments

Cybersecurity engineers have a significant job outlook.  More and more companies are becoming more reliant on technology therefore, more cybersecurity engineers will be needed to secure their systems. Cybersecurity Engineers are responsible for protecting the networks and systems of an organization against threats from criminals in cyberspace.  Their job duties include performing assessments and penetration testing along with the development and implementation of secure network solutions. Cybersecurity engineers must be able to troubleshoot,...

read more

Journal #9

Posted by on 7:15 am in Uncategorized | 0 comments

Over the years, computers have made the world safer and less safe. Life is easier and safer with biometric password options, notification alerts, and location tracking. On the other hand, the world is less safe due to cyber threats. These days, a device may be hard to hack if the owner selects certain password options. A person can protect their devices using face recognition, fingerprint, or even a pattern. Face and fingerprint authentication allow users to scan in order to access a device or workstation. In addition, faster access can be...

read more

Journal Entry #8

Posted by on 6:52 am in Uncategorized | 0 comments

There are always potential cyber threats such as hackers, snoopers, viruses, and phishing attacks in the making. However, there are ways you can make sure your computer is safe. Privacy and security are top priorities when using a computer. Although new computers usually come with the latest software to secure data there are ways you can tell if your device is secured.First, go to your settings and examine your passwords to see if they are strong and unique. If your passwords are weak reset your password or use suggestions from your computer....

read more

Journal Entry #6

Posted by on 5:30 am in Uncategorized | 0 comments

Workplace deviance is defined as a deliberate plan to sabotage a corporation by causing problems within.  Today, crime can occur in an informal way with the use of a computer.  Tech-savvy criminals are able to unlawfully acquire information online with the push of a button.  Day by day these harmful acts have become easier with the use of cyber technology. High-tech criminals use malware tools to set up their attacks. Malware, or malicious software, infiltrates and gains control over a computer system or a mobile device to steal treasured...

read more

Journal Entry #5

Posted by on 4:50 am in Uncategorized | 0 comments

C-Career as a cybersecurity sales engineer that promotes sales Y- You should plug into Poly Swarm to build threat detection skills  B- Become a bug bounty hunter E- Engage in cyber communities such as Hacker One to network and find opportunities R- Receive new certifications S- Situational awareness job E- Experience with knowing how to manage operating systems and network security C- Collection of data logs and build data analysis skills U-Understand cyber architecture and controls R- Risk management job I-Intrusion detection job...

read more

Journal Entry #4

Posted by on 4:40 am in Uncategorized | 0 comments

America and China are highly hooked to the web and thus greatly exposed to cyber-attacks. Most of the attacks are for the aim of cyber espionage, but this risk is real and to not be underestimated. In 2019, the U.S. was ranked fifth most secure, behind Japan, France, Canada, and Denmark. Malicious hacking from domestic or foreign enemies remains a continuing threat to the U.S. and other countries alike.Cyberwarfare is that the use of technology to disrupt the activities of a state or organization, especially the deliberate attacking of data...

read more

Journal Entry #2

Posted by on 4:40 am in Uncategorized | 0 comments

Four majors that relate to Cybersecurity, that Old Dominion University provides, is Cybercrime, Information Systems & Technology, Computer Engineering, and Computer Science. Cybercrime has relation to Cybersecurity because both are computer-oriented, and both deal with the nation’s security, company, etc. Cybercrime is “criminal activities carried out by means of computers or the internet.” These specialists have to deal with criminal activity that targets computer networks or networked devices. Cybersecurity specialists have to deal with...

read more

Journal Entry #1

Posted by on 3:49 am in Uncategorized | 0 comments

My field of study is Cybersecurity. Cybersecurity is the body of technologies designed to protect networks, data, and computer programs. Cybersecurity is a defense medium that works in response to tampered operating systems. With the help of the different technologies, Cybersecurity Analysis and IT’s help prevent data from being attacked or damaged by unauthorized personnel. Cybersecurity offers system and software protection through penetration tests and vulnerability identification. Cybersecurity is important because it helps prevent...

read more