Journal #13

With the increasing number of potential risks and threats that technology brings, it is important to develop a structurally sound approach regarding cyber-policy and infrastructure. However, due to the fact that we are limited in our ability to predict certain threats, it is essential that the approach made be flexible and adaptive to the continuously…

Journal #12

Ever since the rise of technology, cyber technology has given new ways for offenders to attack their victims. In the past, crime would mostly be commited in person or face to face, such as armed robbery, threatening, and physically staking an individual. While all of these crimes still occur to this day, the advancement of…

Journal #11

As the cyberspace continues to grow and advance within modern society, so does the risk and threats of more cybercrimes. By definition, a cybercrime pertains to illegal acts commited through the use of cyber technologies that violate the criminal law that is upheld by the U.S. Department of Justice. This shows an overlap between criminal…

Journal #10

With the increasing reliance that people have on technology as the years go by, it is important that trustworthy systems are implemented in order to protect people from potentially getting hacked or having their personal information tampered with by others such as hackers or cyber criminals. This is why engineers have created numerous ways to…

Journal #9

Like most things in life, technology such as computers have a pros and cons that impact today’s society. Over the last few decades, computers have enabled us to move forward and advance in society by allowing us to accomplish things that were not feasible in the past when there was little to no technology. For…

Journal #8

WIth the rise of modern technology in today’s society, it is important to make sure that one’s technological devices, such as a computer, are properly protected from potential cybersecurity threats. There are many ways to ensure that the security of an individual’s computer is intact. One of the most common ways to protect a computer…

Journal #7

Developing a stable and efficient cybersecurity program in a business is essential for keeping it secure and its integrity intact, especially due to the increasing risk of cybercrimes and cyberattacks because of how much technology is advancing. A business holds many types of information that needs to be protected from potential cyber attacks, including tax…

Journal #6

According to HR Zone, workplace deviance can be defined as the act of deliberately and maliciously attempting to sabotage an organziation by creating problems within the workspace of which they are employed in. There are two types of workplace deviance: interpersonal deviance and organzational deviance. Interpersonal deviance involves the attempt to sabotage via activities such…

Journal #5

Consulting services regarding cybersecurity for businesses/organizations Yield management specialist regarding cybersecurity Blocking hackers Ethical hacker Research regarding cybersecurity to create novel and useful technologies SOC Analyst Ecommerce security  Cyber security freelancer User behavior analyst  Report vulnerabilities within the softwares of businesses/organizations Information Security Officer   Training courses regarding cybersecurity for businesses/organizations Youtube videos that explain key…

Journal #4

Cybercrime is becoming a more of a global issue as technology continues to advance. Because of how boundless the cyberspace is, cyber crimes can be commited from anywhere in the world, and there have been many reports covering these cyber crimes from different countries of the world. For instance, 72% of emails sent globally today…