1. How can you tell if your computer is safe? Before checking if a computer is safe, there should be antivirus installed as a bare minimum. Setting that up should thwart attempts to compromise your computer. But if you decide to open files flagged by your antivirus or download that pdf from the obvious phishing email…
entry_04
What are the costs and benefits of developing cybersecurity programs in business? The cost of implementing a cybersecurity program varies on what kind of business is creating one. Whether a business is large or small matters little to cyber attackers because of the increasing ease to deploy an attack. There are many factors that attribute…
entry_02
Describe four ethical issues that arise when storing electronic information about individuals: When an entity stores information about a user it matters when this is personally identifiable information. This includes social security numbers, credit card information, health records etc. Retention of the data in question is a concern. How long are these entities storing information?…
entry_01
I am interested in cybersecurity as it reaffirms my problem-solving nature that first attracted me to computer science. Computer science is my first major. News of companies being hacked and my re-binging of Mr. Robot during the pandemic got me interested in cybersecurity. The segue to double majoring in both was a no-brainer. After all,…
entry_03
How has cyber technology created opportunities for workplace deviance? Workplace deviation is “deliberate, malicious attempts to sabotage an organization by causing problems in the workplace,” according to HRZone. With advancements in communication technologies and the general advent of the Internet, workplace deviance has increased in the ways it can be carried out. Some might note…