In today’s digital age, where almost everyone uses the internet, it is almost certain that data pertaining to those individuals is present. In fact, most people have more information about themselves online than they do in person. This can create many dilemmas, not only of ethics but also of security. Most people do not understand…
Select four other majors offered by ODU and explain how those majors relate to cybersecurity. Journal 2
This major is the study of society and the world, and how it all interacts with each other. Cybersecurity is definitely related to international relations because the internet is worldwide! Also, there are many stumbling blocks when it comes time to work with foreign nations, or countries. Having an experienced professional who is a cybersecurity…
Why are you interested in cybersecurity technology? Journal 1
Technology is all around us, and we usually interact with it many times each day. Therefore, we put a lot of our personal information on these devices, so it is no surprise that hackers see them as highly valuable targets. For most people, they have more information pertaining to them on technology than they do…
Thinking Ahead
Given the cybersecurity world, and all aspects that are involved in it require some questions to be answered. For example, how does a theoretical idea, such as the CIA triad play a role in cybersecurity? Who owns, and/or manages the data that cybersecurity is set up to protect? Knowledge in the cyber world is constantly…
When the Workplace is not Quite the Workplace
In the workplace, work is happening everyday. Days go by, and people do their thing. Sometimes, things don’t always go according to protocols and procedures. For example, a co-worker may need access to a confidential document, and their co-worker sends it on their personal smartphone. This action would have created an open hole in security….
How Should a CISO Take Responsibility?
The Chief Information Security Officer has the duty to secure the company over a variety of aspects. In this situation, the CIA triad sets a good foundation for security. Using this model, along with other NIST frameworks, can provide helpful guidance and information. In my opinion, employee training is essential. All it takes is for…
The Rough Framing for Cybersecurity
Using the NIST Framework gives a good baseline to start from. It gives a good and solid foundation. The CIA triad is what should result from good NIST framework. It ensures that everything runs smoothly and efficiently. That way a company can make more $$$. At my future workplace, the work you do needs to…