The NICE Workforce Framework is the National Initiative for Cybersecurity Education. The NICE framework is a resource used to help workers expand their cybersecurity workforce. In the future, I would like to become a cyber security analyst. I think the most important categories to focus on for this career are collect and operate, protect and…
BLOG#12
Cyber technology has a big impact on offenders and victims. This has created open opportunities for attackers to attack people in disguise. It has made it easier for offenders to steal people’s personal information because of the new technology. Although cyber technology has provided perpetrators, it has also provided new tools and ways to prevent…
BLOG #10
Engineers contribute massively to make cyber networks safer. There are many more ways that they contribute, but here are the few most important: They implement a range of technical measures which include access controls, encryption, monitor security, training employees, and patch management. When accessing controls, they create two factor authentication which limits the chances of…
BLOG#9
Over the recent years, technology has increasingly improved. The world has become extremely reliant on technology and computers. Although there are many good things that come out of computers and many advantages, there are also many disadvantages that can create an unsafe environment. Three major ways computers have made the world safer is the improvements…
BLOG #8
Keeping your computer safe is extremely important because people store a lot of important information there. There are several ways to ensure your computer is safe. Some of which include securing software and keeping it up to date, using strong passwords and using 3 factor authentication, monitoring your computer’s performance, using virtual private networks, and…
BLOG #7
In the cyber world there are many benefits and costs when it comes to developing cybersecurity programs. Cybersecurity set up is very important especially in businesses. While it is important, it is not free and can be very expensive. Depending on the information being compromised, it can determine the cost of the breach. Starting with…
BLOG#6
Workplace deviance is defined as the act of not accepting standards and resulting in violence, threats, or danger. Cyber technology has increased the probability of work deviance due to many factors. Those factors include cyberloafing, cyberbullying, and identity theft. These are all examples of workplace deviance with cyber technology. Cyberloafing is the act of using…
BLOG#5
CYBERSECURITY C- Creating innovative software for the government Y- Yacht GPS software that is secure B- Bug bounty programmer E- Educating newcomers for cybersecurity professionals R- Rent space to a cyber security company S- Setting up firewall for a website E- Elevator security system C- Car GPS system U- UTM services and provide secure solutions…
BLOG#4
There are many factors to put into place when comparing cybersecurity risks in two different countries. Some of which include economic, cultural, and geopolitical factors. It is well known that the United States is highly advanced with technology. Over the years, technology in America has increasingly developed and adjusted to cybercrime and cyber risks. Some…
BLOG#2
There are many majors provided by ODU that are similar to cyber security. Cybersecurity is multidisciplinary that contains various jobs. The 4 majors that apply to cyber security include criminal justice, business majors, health majors, and biology majors. I would say criminal justice is the closest to a cyber security major. Criminal justice plays a…