Week 6 Journal

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? The United States seems to live in a very reactive, as opposed to proactive, world.  The government identifies many threats but only funds or addresses ones which are deemed credible and more probable than possible.  Though there are…

Week 5 Journal

Describe three ways that computers have made the world safer and less safe. I always find it amazing that the phones we carry in or day to day lives are more advanced than the computer that helped put the first men on the moon.  Computers have allowed the world to reach places never imagined in both…

Week 4 Journal

What are the costs and benefits of developing cybersecurity programs in business? I believe cost can be measured in a couple different ways.  Cost could apply to the actual cost of implementing cybersecurity measures or the cost of an attack, whether that be financial loss or customer loss.  These costs must be weighed against the…

Week 3 Journal

How has cyber technology created opportunities for workplace deviance? Deviance is defined as “departing from usual or accepted standards, especially in social or sexual behavior” (Oxford Languages, 2021).  Workplace deviance would therefore imply an employee exhibiting this type of behavior in a professional workplace.  Basic examples of workplace deviance might consist of sexual harassment, verbal…

Week 3 Freewrite

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Consultant for business’ cybersecurity programsYouth education in cyber threatsBacking up dataE-Commerce cybersecurity solutions Red teamingSelling cybersecurity software and hardwareEthical hacking Creating new software or hardware Update computer software and hardware Running a cybersecurity companyInternet company security Training solutions for…

Week 2 Journal

Describe four ethical issues that arise when storing electronic information about individuals. Compare cybersecurity risks in the U.S. and another country. The cyberworld has not only brought with it an abundance of benefits for society but has drug in a slew of potential ethical issues.  Personal information was once a more difficult thing for criminals…

Week 1 Journal

Answer the following: How does your major relate to cybersecurity technology? Select four other majors offered by ODU and explain how those majors relate to cybersecurity. After years of working toward a degree in Homeland Security (HLS), I started working toward another degree toward Cybersecurity.  These two degrees go hand in hand as a large…

Week 1 Freewrite

***Take fifteen minutes and find out everything you can about yourself by Googling your name. What would others learn about you? Write a quick paragraph in your ePortfolio*** I remember looking myself up on the internet as a kid to see who else had my name.  Back then, social media was not a thing and…