Cyber-technology has affected offenders and victims alike in many different ways. This makes it easier for cybercriminals to do things as technology has evolved, Cyber Harassment entails the repeated pursuit of an individual using electronic or Internet-capable devices. When it comes to cyber offenders is with it being online that person can impersonate anybody and…
Module 5
The new age of technology has made the day to day life extremely versatile; However, This has made the overall security and well-being of people vulnerable based on the information stored on your device. Security Engineers play a pretty important role in protecting businesses and companies from hacking into accounts and stealing intellectual property. Firstly,…
Module 4
There are many benefits to adding or developing cyber programs in business. With adding cyber programs into business work productivity stays constant. More things are protected and secured. It is good for a company to be invested in cyber protection because it limits the possibility of failures and potential lawsuits. This also ensures protection for…
Module 3
Cyber technology has enhanced the way we work and think in many ways both good and bad; however, there are many times in the workplace that cyber tech is used for deviance. Usually being stemmed from a disgruntled employee, workplace deviance can be defined through sabotage as well as malicious attacks aimed to cause problems…
Cyber $$ Freewrite
C- Certifications. Getting Certifications will help to legitimize your portfolio Y- You can learn about network security and then help companies set up their IPS and firewalls. B- Blockchain – Polyworm E- Encryption. Learn how to Encrypt messages for companies. R- Restoration Specialist – Cyber Security S- Software design. Design software for a company E-…
Module 2
There are four ethical issues that arise when storing information electronically about individuals. Overall, computer crime is the number one problem when dealing with computer ethics. Computer crime is but not limited to; hacking, the stealing of any personal property, phishing, ransomware attacks, etc. The second main problem has to do with the ownership and…
Module 1 entry
By: Griffin Ginn My major (being cybersecurity) has everything to do with cyber tech. Cybersecurity refers to how certain key objects and information are protected. Cybersecurity can be both electronic and physical. Physical cybersecurity has to do with the protection of buildings, assets, materials, property, employees, etc. This would be cameras on the outside of…