Journal #5

Create a program that sends an alert to an owners phone when a breach is detectedYearly updates to secure appsBug bountiesEvery week check on companies systems to see if a breach has occurredRevise a companies cybersecurity protocolSystems audits for different companiesEducate company employees on what’s safe and what to do in case of a breachCreate…

Journal #4

The top five nations affected by cybercrime are the US, China, Brazil, Germany, and India. The most common attack across the countries is spam emails. It’s said that spam emails make up more than 70% of all emails sent. The United States is the top target for phishing attacks, making up 60% of the worlds…

Journal #3

A few ethical issues would be keeping the privacy of someone secure, knowing there could possibly be a security breach thus exposing someone’s personal information, the possibility of having inaccurate information, and who ultimately is given access to the information. I feel like the first point I am trying to make is obvious, but, if…

Journal #2

The four majors I decided to go with are health services administration, accounting, finance, and civil engineering. Health services administration relates heavily on cybersecurity because of how much personal information they have. Every patient has to fill out forms that gives their name, address, date of birth, etc. On top of that, the patients form…

Journal #1

Today, practically anything can be bought online, and while it is convenient, it also leaves you vulnerable since all your information is being sent out. Credit card numbers, addresses, and even social security numbers. I switched from computer science to cybersecurity because it seemed much more rewarding, being able to help prevent those wishing to…