ePortfolio #6

A common problem that cyber policies and infrastructures developers face is having the “shorthand” of predictive knowledge. This “shorthand” refers to the uncertain future pertaining to the cyberworld and the policies that are created around it. Developers and people who work in this field struggle with knowing the direction they want to take that would…

ePortfolio #5

Computers have had a monumental effect on the world. In our modern society, we are constantly surrounded by computers, and almost everything is run on a computer. Anything from important databases to the internet is all run on computers and pretty much everyone uses them daily. Computers are defined as “an electronic device for storing…

ePortfolio #4

There are both costs and benefits to implementing a cybersecurity program in a business. There may be cons but the benefits definitely outweigh them because installing a proper cybersecurity program is essential. Small to medium-sized businesses are statistically the most targeted group of being hacked or compromised so today in our technologically oriented world, it…

How has cyber technology created opportunities for workplace deviance?

The cyber technology field has been an exponentially fast-growing area of technology that has and will continue to provide more opportunities for workplace deviance. Workplace deviance is defined as “Workplace deviance, in group psychology, may be described as the deliberate (or intentional) desire to cause harm to an organization”. In the cyberworld, deviance here would…

Freewrite #2

Create an app that rates software. Yacht GPS software that is secure Become an independent consultant  Enter the sales field Raise a business in cybersecurity Security auditing Expand your skills to get into freelance hacking  Create books about cybersecurity  Undertake bug bounty programs Reach out to conferences to speak  Individual coaching  Try to do consulting…

ePortfolio #2

 Describe four ethical issues that arise when storing electronic information about individuals. There are many ethical issues that arise when storing an individual’s information in online systems. Four main ethical issues that come to light when discussing this topic are privacy and confidentiality, security breaches, system implementation, and data inaccuracies. Privacy and confidentiality acknowledge that…

Freewrite Activity

After doing some digging, I couldn’t find much about myself from googling my name. The only thing I was able to come across was my Linked In account. This could only provide a very limited scope of myself which just gave some basic details of me. Using Linked In, you could learn that I’m in…

Journal #1

I chose to major in cyber security. This directly ties in with cyber security technology hence the reason I was interested in taking this class. In the future, as I will get more familiar and in-depth with my major, cyber security technology will become increasingly relevant and directly tied into what I’m learning. There are…