Materials are obscured or encrypted using cryptography so that they can be reliably deciphered by the recipient of the communication. In cybersecurity, the term “cryptography” refers to secure information and communication methods that use computational techniques and computational systems that follow regulations or “algorithms” to change communications into an unreadable form. These predictable algorithms are…
Author: ksams002
Cost and Benefits of Developing Cyber Security Programs in Companies
Establishing cyber security is very important for companies. Having an established cyber security can protect corporate information from hackers and human error. However, setting up a cybersecurity program can be expensive. One cost will be the default. This involves hiring a cybersecurity company to install a system on your computer. The company should research what…
Cyber Technology and the Workplace Deviance it Produces
Deviance is described as “a fact or condition that deviates from customary or accepted norms, especially in social or sexual conduct”. Workplace deviance can easily occur in the field of cybertechnology, as it can occur over the internet rather than face-to-face, which is more difficult to detect. A disgruntled employee may make a decision that…
Legal Ways to Make Money Using Cybersecurity
Create an app that rates software. Yacht GPS software that is secure Blocking hackers from attacking a company E-commerce security Rent out a space to a cyber security company Set up a firewall for a website Eventually, create your own cybersecurity company Car GPS software that is secure Unite multiple companies to report hacks in…
Cybersecurity Risk in the U.S and Other Countries
Every country faces cybersecurity risks. Cybersecurity risk is the potential for loss due to a cyberattack or data breach within an organization. Different countries face different cyber risks. Technology is advancing every day, and it’s important to develop new strategies and defenses every day. Phishing scams are very popular in the United States. According to…
4 Ethical Issues with Storing Info
1) Privacy: Privacy is one of the key moral dilemmas that arises from storing technical data about individuals. Personally identifiable information stored electronically may include sensitive information, including medical records, financial information, and personally identifiable information that can be used to identify an individual. Such data should be stored using appropriate safeguards to protect the…
Majors Relating to Cybersecurity (ODU)
The four majors I have chosen for ODU are Cyber Operations, Cyber Crime, Criminal Justice, and Enterprise Cyber Security. Let’s discuss how these four key areas relate to cybersecurity. Cybercrime includes any illegal activity involving computers, other digital devices, or computer networks. Cybercrime addresses common cybersecurity threats such as social engineering, exploitation of software vulnerabilities,…
Journal #1
Why Cybersecurity? Cybersecurity Technology really interests me because of the importance I believe it has on our society and my own past experiences with technology in general. From a very young age to now you could describe me as an “ipad kid” or what people refer to as someone who always has their eyes on…