Journal #6

A network security engineer’s job is to implement new tactics and monitor the security infrastructure of programs and technological devices. Their main goal is to create a safe environment for users. This is huge in the cybersecurity field, allowing programs and technological devices to be monitored and updated for the future. The engineers can apply…

Journal #5

There is never an exact way to tell if your computer is safe; however, there are measures to take to give a better perspective on if it is or not. Computers and technology are evolving each day. This allows disruptions and hacks to be made and figured out as well. Security is very hard to…

Journal #4

There are many benefits of developing cybersecurity programs in businesses. Small businesses are more at a risk of cyberattacks and breaches from no cybersecurity programs and security put in place from money. Small businesses and fresh starting businesses normally are worried about making the minimum and reaching for the maximum of income. The cybersecurity issue…

Journal #3

Technology’s evolvement is reaching new levels each day. There are jobs to create and update technology to stay up to speed with the world’s changes. Jobs are becoming more frequently done from home especially after the Covid pandemic. Computers and laptops are used for many occupations allowing room for cyber workplace deviance. Deviance is a…

Journal #2

The first main ethical issue that comes with storing electronic information about individuals is potential risks and attacks. When electrical storing information, it is automatically open to risk of threats and attacks by hackers based off of how secure it is. The next issue leading from potential cyber risks and threats is exposure of information….

Journal #1

I had a nursing background before transferring to become a cybercrime major. I am very interested in making a difference and fixing the way technology is broken into. Technology is becoming more and more the core of this world. This means more involvement with technology and progression with the software. The security of everything needs…