ePortfolio entry 7

How does cyber technology impact interactions between offenders and victims? In order to discuss this, we first must discuss what cybervictimization is. Cybervictimization is defined as a process of victimizing many offenders via the power of the internet through the use of information and communication technologies. This has paved the way for many for offenders…

ePortfolio entry 6

How do engineers make cyber networks safer? In order to answer that question, we first need to look at what a network engineer actually does. The main purpose of a network engineer is can be from maintaining an internal internet connection to intranets; or better yet a server room full of powerful racked devices and…

ePortfolio entry 5

How can I tell if my computer is safe? The most important thing to be sure your computer is safe is that to be sure that it has not been infected by a virus. Viruses are very important for you to understand especially that it could have major consequences to your computer. If a virus…

ePortfolio entry 4

What are the costs and benefits of developing cybersecurity programs in business? A lot of that has to depend the budget provided as well what environment that the business is in. The first thing that businesses need to deal with when it comes to developing cybersecurity programs is to determine the cost. Depending on the…

ePortfolio entry 3

How has cyber technology created opportunities for workplace deviance? There are many ways that many opportunities have been established for workplace deviance. First of, what is workplace deviance? It is the practice of when a person attempt to sabotage a business by generating a problem that can lead to unintended consequences for a business; even…

ePortfolio entry 2

There are four types of ethical issues that arise when it comes to storing electronic information about individuals. And they are data breach, data inaccuracies, system implementation, and confidentiality. The first example is data breach. A data breach can occur when occurs when unauthorized individuals gain access to sensitive information. Types of information stolen includes…

ePortfolio Entry 1

There is a reason why i have chosen cybersecurity as my major when i first came to Old Dominion University. I have chosen my major because I have been so fascinated with technology since I was a kid. One of the first things when it comes to technology was computers. The first thing that comes…