-How has cyber technology created opportunities for workplace deviance?
Cyber technology has created opportunities for deviance in the workplace by making it easier and allowing it to go undetected. For many individuals that don’t work in information technologies or cybersecurity, access list and security groups are hard to understand. The people that control those access lists and groups are system admins or security managers, and yes they can make mistakes from time to time. Often those admins are an after thought when it comes to informing them about personnel changes or role changes. When such changes occur that individual or user that was laid off, demoted, or promoted, might still have access to files and information that they no long need to access. If that individual became disgruntled and wanted to seek out revenge on the company or it’s clients, then that access would make it easy for them to delete important files, manipulate important data, or even steal and sell to a competitor. If the network doesn’t have reliable logging, data back ups, or auditing in place then that user could go about the deviance pretty much undetected and unnoticed.
-Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.
C – Consulting or becoming a Cybersecurity Consultant
Y – Youtube. Cybersecurity individuals can easily make videos teaching, explaining, or vloging, about the Cybersecurity industry, developments, and vulnerabilities.
B – Booksales. If you become an expert in the field, you could potential write a book or develop a study guid for the new Cybersecurity certification and exam.
E – Ethical hacking. Companies will pay big bucks for someone to test their Cybersecurity stance and protocols.
R – Risk Analyst. Evaluating a companies risks of cyberattacks or predicting what type of attack organizations would be vulnerable to.
S – Sales or Service. Selling a new application that would keep information safe, or providing your services to fix and install new patches or applications.
E – Encryption. Develop a new algorithm or find a way to crack the newest encryption and sell the fix to the developer.
C – Conferences. Speak a conferences and discuss and explain new developments in the field as well as vulnerabilities to be on the look out for.
U – User Support. Work at a help desk and support normal day to day clients or personnel
R – Recovery. If you can recover important data that organizations thought was gone for good, they will open their wallets for you.
I – Investigation. Being able to identify where an attack came from through investigation and forensics would be a great way to get some extra cash
T – Training. Becoming an instructor or trainer on a certain system, topic, or application can be a great source of income.
Y – You. Develop your skills, knowledge, and certification, and find your own path to making money in the cybersecurity world.
Leave a Reply