Journal Entry #7

Developing cybersecurity programs in a business should be a pushed requirement when it comes to protecting a business, especially in current modern technology times. A major con when it comes to developing cybersecurity programs in a business is the cost. It can be extremely expensive for a business, big or small, to maintain a basic […]

Read more "Journal Entry #7"

Journal Entry #6

Cyber technology has created numerous opportunities for workplace deviance, as it has provided employees with innovative ways to engage in unethical or illegal activities. One example of enabled deviance in the workplace is cyberbullying. Social media made its presence in 1997, but it skyrocketed in the early 2000s after blogging became popular. This led to […]

Read more "Journal Entry #6"

Journal Entry #5

Create app that detects vulnerabilitiesYield account software that is secure for bankingBotnet prevention softwareEncryption software for voice notesRecovery protocols for start-up businessesSecure and store digital assets in a safe areaEnable only authorized users to confidential dataCredit Card payment software that is secureUpdate employees on new cybersecurity risksRoutine security software updatesInitiate study groups for cybersecurity majorsTrain employees on […]

Read more "Journal Entry #5"

Journal Entry #4

Cybersecurity dangers differ from nation to nation depending on a range of elements, including the degree of technological advancement, the structure of the legal system, and the frequency of cybercrime. The two countries that I will hold in comparison in regard to cybersecurity risks are the United States and China. The United States is one […]

Read more "Journal Entry #4"

Journal Entry #3

One of the primary ethical concerns related to storing electronic information about individuals is privacy. People have a right to know what information is being collected about them, who has access to that information, and how it is being used. Electronic information can include sensitive personal data such as medical records, financial information, and social […]

Read more "Journal Entry #3"

Journal Entry #2

Cybersecurity is a field that encompasses various disciplines, including computer science, cybercrime, computer engineering, and information systems & technology. Each of these fields contributes to the development and implementation of cybersecurity measures that protect against unauthorized access, data breaches, and other types of threats. Computer science involves the study of computers and computational systems and […]

Read more "Journal Entry #2"

Journal Entry #1

What interests me the most about Cybersecurity is the depth and knowledge that you obtain when you dig deeper into the subject. There are so many branches and levels to Cybersecurity as well as different departments you can work in if you choose this as a career field. I studied under the STEM Program in […]

Read more "Journal Entry #1"