The development of cyber-policies and infrastructure must be adaptive to compensate for the “short arm” of predictive knowledge. With threats constantly changing and adapting so must cyber policies too must adapt to meet these threats head on. The best aspect of technology is its adaptability to meet our needs and wants. However, this creates a…
Journal #11
Cyber harassment and cyber bullying are a major problem that often spans all age groups but is especially prevalent amongst school age children. As technology has imbedded itself into our everyday life it is basically impossible to get away from a bully’s grasp. Through the use of social media, instant messenger, and many other social…
Journal #10
Engineers play an important role in securing cyber networks. Engineers play an important role in the creation of networks. In creating new networks engineers can also aid in patching vulnerabilities in networks. This plays a vital role in both discovering holes in the network defenses but also patches and strengthens the networks security. Engineers also aid…
Journal 5
The article, Social Cybersecurity an Emerging National Security Requirement, takes an in depth look into what’s known as social cybersecurity. Social cybersecurity addresses how through social media platforms influence can be made onto the public and personal opinion of a topic. By using these platforms to manipulate or spread false information allows for a group…
Journal #9
Computers have brought a great deal of benefits to our everyday lives. They have become an invaluable part of the lives of billions and can make our lives safer but also expose us to new dangers. The first way that computers make the world a safer place is increasing the speed of which we communicate….
Journal #8
There are many ways to tell if your computer is safe to use. Maintaining a secure computer or network is key to the integrity of the data it holds. A key component in ensuring a secure computer is maintaining and updating your computers antivirus software. This software will allow you to scan for viruses or…
Journal #6
How has cyber technology created opportunities for workplace deviance? The use of cyber technology has created many opportunities for workplace crimes to take place. There have been many instances of corporate espionage or illegally trading of company secrets in order to gain an edge over a corporate rival. With so much information at the fingertips…
Journal #7
What are the costs and benefits of developing cybersecurity programs in business? There are many benefits in creating a cybersecurity program for a business. Even a small business should consider the benefits of implementing cybersecurity protocols into their daily operations. A comprehensive cybersecurity program helps secure customer data, company data, and employee information. Having a…
Journal 4
Review the articles linked with each individual motive. Rank the motives from 1 to 8 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. Money– Financial gain is a huge motivator. Money can have a…
Journal #5
Consultant for security firm YouTube videos on cybersecurity topics Become an instructor of cybersecurity Electronic transaction security Remote cybersecurity analyst Security administrator Encryption software developer Cryptographer Upgrading companies cybersecurity Removal of maliciouse content from infected computers Information security specialist Testing security protocols Yellow team builder in it department