How can you tell if your computer is safe? Computers are the center of daily life for multiple people in our current society. Thus, they hold sensitive data for not only corporations but also for the average person’s computer. Hackers see this sensitive data as a gold mine and target these computers. However where a…
Author: mlock009
Journal 7
What are the costs and benefits of developing cybersecurity programs in business? Cybersecurity gives us many costs as well as benefits when we use it for various reasons: Cybersecurity has revolutionized the way we do business. In our current century, it has made itself indisposable to business practices. These reasons of its importance are first…
Journal 11
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? First criminal justice is defined as a universal term that refers to the laws, procedures, institutions, and policies that happen during a crime. At the same time, cybercrime is defined as illegal acts…
Journal 6
How has cyber technology created opportunities for workplace deviance? In our current age, the temptation to commit workplace deviance is more present more than ever. Because cyber-security is so expensive, companies do not pay what they should to keep their consumers safe, making it very easy for employees to take advantage of their systems. This…
Journal 5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. C alucating algorithm used security programs Y ELP (Selling your reviews) B reaking firesticks or phones E ducating people in cybersecurity R eading digital assets of suspected criminals S elling cybersecurity E mploying people to watch over an organization’s system C ryptography U ncovering vulnerable on R eassure…
Journal 4
Compare cybersecurity risks in the U.S. and another country. When compared, the united states has several cybersecurity risks in common with England. The united states came in low or top-five placement in multiple surveys. There are numerous risks in our cybersecurity for the united states, such as loss of data, hacking, single-factor passwords, insider threat,…
Journal 3
Describe four ethical issues that arise when storing electronic information about individuals. Four issues that arise when storing electronic information about individuals are an inappropriate use of data, security breaches, data inaccuracies, and discrimination. In the first issue, companies often use collected users’ data in an attempt to profit off of their users using a…
Journal #2
Four other majors that old dominion offers are applied mathematics, computer science, computer engineering, and information systems. These are all components when you are working with Cybersecurity. Applied mathematics is defined as the application of mathematics to problems that arise in various areas of science, engineering. It is also the development of improved methods to meet the challenges of…
Journal #1
My major is cybersecurity; it relates heavily to cybersecurity technology. Cybersecurity protects the data’s assets that belong to or connect to an organization’s network. Cybersecurity’s purpose is to defend against all threats against the network. One role in the cybersecurity field that is my future goal is as an information security analyst. As concerns for…