How can you tell if your computer is safe? If the computer you are using is not protected, identity thieves and other hackers may be able to get access and steal your personal information. That is why it is important to use safety measures and good practices to protect your computer devices, by doing this…
Entry 7
How does cyber technology impact interactions between offenders and victims? Technology has changed everyones ability to access information, it has changed where, when, who, and how much information we can gather. The internet makes information available that may otherwise be inaccessible. This alone has changed the relationship between the offenders of crimes and their victims….
Entry 6
How do engineers make cyber networks safer? A cybersecurity engineer is responsible for protecting the networks and systems of an organization against threats from adversaries in cyberspace. The functions of a cybersecurity engineer include preforming assessments and penetration testing, developing and implementing secure network solutions, architecting and engineering trusted systems into secure systems, and managing…
Entry 4
What are the costs and benefits of developing cybersecurity programs in business? With the threat of a cyber attack happening at any given moment all businesses big or small need to have some sort of cybersecurity program set up for the just incase and all what-if scenarios. According to IBM’s Cost of Data Breach Report…
Entry 3
How has cyber technology created opportunities for workplace deviance? Deviance is depicted as the reality or condition of withdrawing from common or acknowledged norms, particularly in friendly adult conduct. Penn State College of IST describes that information and computer technology(ICT) workplace deviance may include sabotaging computer programs, stealing proprietary information, executing viruses and hacking into…
Entry 2
Describe four ethical issues that arise when storing electronic information about individuals. Four ethical issues that could arise when strong electronic information about individuals could security, confidentiality, integrity, and implementation. There are many things that people could be choosing to electronically store that would be classified as sensitive or private personal information, and those items…
Entry 1
Why am I interested in cybersecurity? I am interested in cybersecurity because it is an always changing field where you have different challenges every day. These new challenges are because hackers are constantly coming up with different methods to hack into programs to sell private information. When I was in the United States Marine Corps…