Journal Week 1

The major I am currently taking is cybersecurity. It relates to cybersecurity because they are the same thing. I decided to take cybersecurity because it peaked my interest in technology. I’m enjoying learning new things about the tech world every day and applying them to real life. I cant wait to see where this major…

Journal Week 7

Cyber breaches are on the increase, making it more critical than ever for businesses to sit down and discuss their strategies and technology. Aside from providing insurers in place to help mitigate the damage, developing such plans is difficult due to the rapid evolution of technology. Aside from developing, it’s a difficult topic to understand…

Journal Week 6

1. Cyber breaches are on the increase, making it more critical than ever for businesses to sit down and discuss their strategies and technology. Aside from providing insurers in place to help mitigate the damage, developing such plans is difficult due to the rapid evolution of technology. Aside from developing, it’s a difficult topic to…

Journal Week 5

Computers are some of the most essential things we have on this planet. They allow us to do so many things in a more safe and efficient way. Some examples would be data encryption. Data encryption keeps all of your private information and data encrypted so that no one can access it. The concern for…

Journal Week 4

There are many costs and benefits to developing a cyber security program in business. These programs can be very costly and difficult to maintain, but worth it. The costs stemming from a cyberattack can vary tremendously but are inarguably significant. Recent studies have shown that the average cost of a data breach to Small Business…

Journal Week #3

Workplace deviance, in group psychology, may be described as the deliberate desire to cause harm to an organization more specifically, a workplace. The concept has become an instrumental component in the field of organizational communication. Workplace deviance is much more likely to happen in the cybersecurity field due to it dealing with the internet majority…

Assignment: Free Write

Create app that rates softwareYacht GPS software that is secure Blocking Hackers Enter into a cybersecurity field Rent out a building Start up a software Either start a company or join one Create a firewall for company Unite multiple companies Rate a companies software or security system Internship until you get the official job Teach…

Journal Entry Week #2

1.PRIVACY AND CONFIDENTIALITY: Health care institutions, insurance companies and others will require access to the data if ERs are to function as designed. The key to preserving confidentiality is to allow only authorized individuals to have access to information. This begins with authorizing users. The user’s access is based on pre-established role-based privileges. The administrator…