Journal #10

System engineers lie at the very heart of the complex problem of managing large-scale operations. A well put together and maintained system is essential for key industries to operate safely, efficiently, and with reduced errors. Ultimately, a system engineer protects the assets of a network through the “engineering of security functions; addressing the security aspects…

Journal #9

Computers have completely changed nearly every facets of our lives. Though with such revolutionary changes comes both positive and negative impacts. In some ways computers have made the world a much safer place, but on the other hand there are ways such technology have made the world less safe. One way that computers have made…

Journal #8

Knowing that your computer safe is a multistage process. It involves taking preventive measures, checking that your defenses are in proper order, and being able to recognize and handle any security problems that do arise. There are multitude of ways to keep the security of your daily devices from being compromised. One of the easiest…

Journal #7

Every business has a unique cybersecurity situation. For this reason, there truly is no simple one size fits all approach for protecting a business’s assets. Developing a cybersecurity plan in the workplace is a balancing act between budget and situation specific risks. The two factors of cyberattack risk and budgetary constraints are what will determine…

Journal #6

In an article from the Journal of Management Information Systems the research team defines cyber-deviance as the “use of IT in the workplace that is contrary to the explicit and implicit norms of the organization, and that threatens the well-being of the organization and/or its members” (Venkatraman et al.). A more boiled down version of…

Journal #5

Legal ways to make money in cybersecurity: Code an intrusion detection system software YouTube channel on technology w/ ad revenue & sponsors Build an app for tracking companies that have suffered breaches Engineer computer hardware Ransomware recovery services Start a cybersecurity firm Entry level job in cybersecurity field Create an online cybersecurity course Use cyber…

Journal #4

The United States and the Kingdom of Denmark are two very seemingly different nations. The United States has a much larger population, larger land mass, and carry two completely different geopolitical roles. One area in which they do have something in common is that, depending on the source and metrics used, the two are often…

Journal #3

When it comes to digitally storing the personal information of individual users, those in charge have a moral , and often a legal, obligation to treat and handle this data ethically. Ethical data handling is far from a single threaded issue. Some of the issues that are particularly deserving of greater scrutiny include data sourcing,…

Journal #2

Cybersecurity is a subject that is best examined and understood through an interdisciplinary lens. To only focus on networks, firewalls, packets, etc. is to miss out on the sweeping impact the topic has to offer. If one was to look thoroughly enough they could probably draw a connection to any field of study. For example,…

Journal #1

I am interested in studying cybersecurity technology for a multitude of reasons. My life has been a journey leading to studying this topic now. From a young age my interest in technology was sparked by video games and a remote controlled robot that I had. Then throughout elementary and high school I always enjoyed computer…