Long Paper

The Importance of Cybersecurity Education for Half the Everyday Users Introduction            The IT/cybersecurity department inside an organization works hard to keep the organization’s, employee’s, and customer’s information safe. Nevertheless, researchers often say humans are the weakest link in the security chain (Ricci, Breitinger, & Baggili, 2019. Part of the problem…

Short Analytical 5

Risk and Security Planning Introduction             Risk is defined as a possibility of loss or injury (Merriam-Webster, n.d.). Most of us want to avoid risks. Yet, we make quick decisions based on time, and convenience, every day. For example, most lock doors and purchase security for our homes based on the risk of theft in…

Short Analytical 4

The Cloud Introduction             IBM describes cloud computing as on-demand access, via the internet, to computing resources – applications, servers (physical servers and virtual servers), data storage, development tools, networking capabilities, and more – hosted at a remote data center managed by a cloud service provider (CSP) (Vennam, 2020). In recent times many large organizations…

Short Analytical 3

FirewallCristina LaingCybersecurity PrinciplesCYSE 600August 6, 2021Dr. George Mikulski Author NoteThis is my own work and has been done solely by me. This paper has been written for the OldDominion University’s CYSE 600 Cybersecurity Principles class and not used for any otherpurposes.Cristina Laing AbstractThis paper analyzes two firewall research papers: Denial of Firewalling Attacks (DoF): The…

Short Analytica 2

Running Head: VIRUS DETECTION 1Virus DetectionCristina LaingCybersecurity PrinciplesCYSE 600August 6, 2021Dr. George R. Mikulski Author NoteThis is my own work and has been done solely by me. This paper has been written for the OldDominion University’s CYSE 600 Cybersecurity Principles class and not used for any otherpurpose.Cristina Laing AbstractThis paper is an analysis of three…

Reflective Journal 3

In the last weeks of my internship, I had a lot to consider. The internship experience was and is a great experience that has taught me a lot about myself and the direction I want to go with my career. Dollar Tree is an excellent company with a wonderful working environment. Still, I do not…

Reflective Journal 1

I am grateful for the chance to intern with Dollar Tree in the Information Systems department. I have learned a lot about office life, customer service, and hardware. Still, at times I wonder if I should do more in my internship to prepare myself for my future cybersecurity career better. There was a sense of…

Reflective Journal 2

I am coming up to the end of my bachelor’s degree, and though this means a new beginning with many possibilities, I can’t help to be nervous, unsure, and anxious for my future. Why should you ask? Even though I have had a stellar education at ODU and my internship with Dollar Tree has given…

Mod 10

Cybercrime sociological definition is cyber-related behavior that is against the law. In Module 12, it is stated that cybercrime can have many meanings depending on who is asked. Cybersecurity, like cybercrime, has no universal definition. “Cybercrime involves the illegal acts involving cyber technologies that are in violation of the criminal law” (Payne and Hadzhidimova, 2018)….

Mod 9

How do engineers make cyber networks safer?             An Engineer that is in charge of the cyber network’s safety is called a security engineer. Security engineers are employed by various companies and are most likely found in every company nowadays. Security engineers are responsible for the “implementation and administration of network security hardware and software,…

Mod 7

What are the costs and benefits of developing cybersecurity programs in business?            When I was an intern for a Fortune 500 company, I was privy to an insider project that did not succeed and had to be sourced out eventually. The project’s goal was to make a website interface easy…

Mod 6

How has cyber technology created opportunities for workplace deviance?             Workplace deviance is explained as “counterproductive behavior directed towards co-workers” (O’neill, 2011). With the advent of the internet, new opportunities for counterproductivity have been created or updated in the workplace. Workplaces such as office might have the highest opportunity for workplace deviance. However, any sector…

Mod 5

Cryptanalyst Yearly audit for a consulting firm Behavioral analyst of hackers and cybercriminals Ethical hacker Researcher System analyst Estimator for cyber risk insurance Contractor/consultant for the military University career advisor for cybersecurity students Radio or Podcast host educating the public on best practices Illustrator and author of children’s books on computer safety Teaching youth K-12…