Week 6

Maxwell Ferrier October 17, 2020 CYSE 200T             Cyber policy and infrastructure must be taken seriously given the short-arm of predictive knowledge that occurs. Cyber attackers are good at what they do, and predicting a cyber-attack can certainly be difficult.  It is more of a question of when it is going to happen rather than…

Week 5

Maxwell Ferrier October 11, 2020 CYSE 200T             Computers are a wonderful thing that can harm us in many ways. This oxymoron is cheesy yet true, as we have seen all too well in recent years. Computers have made the world oddly safer in some ways, and less safe in others.             Computers have truly…

Week 4

Maxwell Ferrier CYSE 200T September 27, 2020 Developing cybersecurity programs in business brings some significant advantages since cyber security and business overlap with flying colors.  Businesses must have cybersecurity to protect themselves and their customers, while cybersecurity needs business in order to be successful and make money within that field.  With cybersecurity properly implemented into…

Week 3 Part 2

Whether it be for personal, emotional, or financial reasons, deviance at some point within the workplace is inevitable.  Deviance occurs when someone does something that is out of the ordinary according to societal norms.  As cyber technology has evolved to be as big and complex as it is today, we have seen an increase in…

Week 2 pt 2

Maxwell Ferrier CYSE 200T September 17, 2020 Every year, billions and billions of dollars are lost due to cyber-attacks.  It is imperative that small businesses do not ignore the great risks that cybercriminals impose on the safety of their business.  One common misconception is that small businesses are not targeted because they are indeed on…

Week 3 – Acronym

Maxwell Ferrier CYSE 200T September 17, 2020 Making Money in Cybersecurity Consulting professionally for others companies regarding their security flaws. Yahoo Mail consulting. Backing up different company’s databases. Educating yourself (obtaining a cybersecurity certification) Revamping out of date cyber security frameworks. Schedule a “pentest” with a small, local business. Enforcing policies aimed at limiting employee…

Googling Myself

Upon taking the time to Google myself, I was easily able to gather some information.  The first thing I found was my Facebook profile, revealing my location, previous education, friends, and my place of work.  From my profile alone, others could infer a few of my personal hobbies including snowboarding and playing basketball.