Cyber technology has impacted interaction between offenders and victims permanently. The fact that someone can be anonymous and doing illegal acts and no face to put the crime to is frightening. I would say for the most part cyber technology has negatively affected the interaction between offenders and victims because the offenders may have a…
Journal #6
There are multiple ways that engineers can make cyber networks safer including, Firewalls, VPN, update passwords frequently, monitor networks, etc. One thing that needs to stay consistent when regarding engineers making cyber networks safer is monitor networks, there always needs to be a team looking for inconsistencies in a network and reporting those inconsistencies so…
Journal #5
Keeping your computer safe is the number 1 responsibility when it comes to owning or using a computer. Computers get hacked all of the time and valuable information is lost because of the lack of security some people choose to take. The one way to keep your computer safe is security program that will block…
Journal #4
There are many benefits when it comes to developing cybersecurity programs in business. One benefit is the protection of personal data. Depending on what time of company we are talking about there is going to be a certain amount of personal information that the business has stored about their clients. For example, a financial institution…
Journal #3
Cyber technology has created many opportunities for workplace deviance. First we can look at what cyber technology consists of, which is computer programs, viruses, hacking, etc. All of these things that have been listed have the capability of retrieving private information and doing harm. With all of this being said, there can definitely be some…
Journal #2
One ethical issue when it comes to storing information about an individual is security breaches. A security breach is a big ethical issue because private information is now in another person’s hands. Security breaches are probably going to be targeted towards information that can be used for another person’s gain so credit card information, SSN,…
Journal #1
I am interested in cybersecurity technology because I am very technology savvy. I am very customed to using technology in my everyday life. I would like to learn more about the security side of what I use in my everyday life. One thing that comes to mind is that if I am good at using…