Journal 1 Of the NICE Framework I would want to focus my career on the Operate and Maintain category as well as the Protect and Defend category. Operate and Maintain includes specializations such as Technical or customer Support, system administration and System analysis. I am interested in all of these areas, also as it stands…
Author: lglad001
Journal 1
Of the NICE Framework I would want to focus my career on the Operate and Maintain category as well as the Protect and Defend category. Operate and Maintain includes specializations such as Technical or customer Support, system administration and System analysis. I am interested in all of these areas, also as it stands I have…
Journal #1
I am interested in cybersecurity technology because it is a broad field of study that relates to everyday life. Growing up in the age of technology I am constantly using electronics from phones and computers to an electric stove. There was also a time where I wanted to join the navy and work as a…
Journal Entry #7
1. How does cyber technology impact interactions between offenders and victims? Cyber technology has had both positive and negative impacts on society. It is now easier to connect with other, work opportunities and more fun things to do in general with access to technology. However it has also given rise to predators who this technology…
Journal Entry #6
1. How do engineers make cyber networks safer? An engineer is someone who is responsible for designing machines and systems for a specific purpose and also maintain these systems and machines. Engineers aid in making cyber networks safer by identifying threats and vulnerabilities within a system or software. They then use their skills to make solutions…
Journal Entry #5
How can you tell if your computer is safe? There are many ways to determine the safety of your computer. The first step is to ensure that you have gone through appropriate measures to make your computer safe. This includes making sure you have a strong password to get into your computer and having a…
Journal Entry #4
What are the costs and benefits of developing cybersecurity programs in business? Developing a cybersecurity program in a business could be costly but would be well worth the time. Business are just as susceptible to cyber attacks as an individual, or even more as business can be specifically targeted for a variety of reasons. Therefore…
Journal Entry #3
How has cyber technology created opportunities for workplace deviance? Technology is constantly evolving and we as people have evolved with it. This evolution of technology has done great for society but it can also cause some to deviate away from rules and try to use technology for in a disgraceful manner. There is an abundance…
Journal Entry #2
1. Describe four ethical issues that arise when storing electronic information about individuals. When we as a people provide our information for certain websites or applications we expect for our information to be safe. This can be the case but here are always risks associated with storing information electronically. Four ethical issues I have found…
Journal Entry #1
I am interested in cybersecurity technology because it is a broad field of study that relates to everyday life. Growing up in the age of technology I am constantly using electronics from phones and computers to an electric stove. There was also a time where I wanted to join the navy and work as a…