ePortfolio entry #11

The significant overlap that exists between cybercrime and criminal justice highlights the complex interplay between illicit actions carried out via digital platforms and the legal structure that is intended to enforce social laws. Cybercrime is the term used to describe a wide range of illegal behaviors carried out using computers, the internet, and other electronic…

ePortfolio entry #10

The implementation of diverse techniques and technologies by engineers is crucial in enhancing the security of cyber networks by mitigating cyber threats. The secure communication protocols and standards that control data transmission via networks are created and designed by engineers. These protocols, which include SSH for secure remote access and HTTPS for safe online browsing,…

ePortfolio entry #9

Computers have undoubtedly revolutionized the world in many ways, making life more convenient and efficient. However, they have also introduced new challenges and risks, especially in terms of cybersecurity. One way that computers have made the word safer is through communication. Instant messaging, email, and social media platforms are all safe ways to communicate with…

ePortfolio entry #8

In this digital age, where cyber dangers are always changing, making sure your computer is protected is essential. Installing trustworthy antivirus software is one of the first steps towards computer protection. These tools assist in identifying and eliminating viruses, malware, and other harmful software that might endanger your computer. Updating your operating system, applications, and…

ePortfolio entry #7

There are expenses and advantages to implementing cybersecurity strategies in businesses. To begin with, the cost of implementing cybersecurity measures is high and demands a substantial financial commitment. In addition to hiring cybersecurity experts to administer and keep an eye on the system, this entails acquiring security software, hardware, and other technologies. There is a…

ePortfolio entry #6

Cyber technology has brought many benefits to the workplace, but it has also created opportunities for workplace deviance. Workplace deviance refers to any behavior that violates organizational norms or expectations and can harm the organization or its members. Here are some ways cyber technology has influenced workplace deviance: With the rise of digital communication channels…

ePortfolio entry #5

C – Cryptocurrency SecurityY – Youtube TutorialsB – Biometric Security SolutionsE – Ethical HackingR – Remote Security MonitoringS – Security Training CoursesE – Encryption ServicesC – Cloud Security ConsultingU – Upgrading Security InfrastructureR – Risk Assessment ServicesI – Incident Response ServicesT – Threat Hunting ServicesY – Young Professional Mentorship

ePortfolio entry #3

The privacy protection of individuals is a significant concern. When people save electronic data, such as surfing history, medical records, or personal information—without taking the necessary precautions, their privacy may be violated. People have the right to decide who can access and use their personal information, therefore it’s important to make sure that data is…

ePortfolio entry #2

There are plenty of others majors that are related to Cybersecurity. Some of these majors include Computer Science, Engineering, Information Science, and Information Technology (IT). Just like Cybersecurity, all of these other majors include technology-related work. Information technology (IT) is very simulator to cybersecurity as IT’s primary mission is information security and to ensure systems…

ePortfolio entry #4

 Compare cybersecurity risks in the U.S. and another country: The United States has very advanced cyber capabilities compared to other countries. North Korea, for example, is known to have a state-sponsored hacking group known as Lazarus Group, which have been connected to many other cyberattacks. However, North Korea lacks the resources and cyber infrastructure that…