Eportfolio #7

The impact of cybertechnology and the world of crime and crime victimization has increased. With the continuous advances in technology, means that there are more advanced and effective ways for criminals to commit these crimes. The internet gives criminals an advantage in committing crimes on potential victims as it allows for these criminals to commit…

Eportfolio #1

I am interested in the cybersecurity program, as we interact with cybertechnology every day, from our phones, computers, tablets, even things as simple as e-readers such as Kindles, and apple watches. I find it fascinating how such a complex technological mind can be in such small devices. I am also interested in how I can…

Eportfolio #5

Technology is always advancing. There are continuous outpours of different types of computers, including miniature computers like cell phones, that are always being released! As we continue to purchase and utilize these devices, ensuring that they are safe and secure is a crucial step, to prevent/alleviate the ever-looming threat of cybercriminals. But how can we…

Eportfolio Entry #4

In today’s current age of technology, having an effective and efficient cybersecurity program is imperative to the protection of intellectual property, and data. As technology continues to advance, security threats become increasingly volatile and destructive. Businesses are becoming more aware of cybersecurity and the steps needed to ensure that their assets and data are safeguarded….

E-portfolio Entry 6

As technology continues to advance society in many different ways, we need individuals who are capable of engineering programs that identify risks and threats along with creating software that serves to protect our intellectual property. Those who are tasked with the creation are known as cybersecurity engineers. They ensure internet safety by identifying threats, then…

Ethical issues when storing personal information

Four ethical issues that arise when storing information about people are ensuring that the information is stored securely, that the information is being used correctly, information is only accessed by those who have permission to said information, and ensuring information security during a crisis such as natural disasters. Protecting and safeguarding personal information will help…

How has cybersecurity created opportunities for workplace deviance?

Workplace deviance occurs when an employee voluntarily acts in a way that can harm a company, it’s employees, and the productivity of the company. Cybersecurity has created more opportunities for workplace deviance to occur, as the harmful actions are much more easily committed online versus in person. With the creation of more effective security measures,…

Hello world!

Welcome to Old Dominion University – WordPress. This is your first post. Edit or delete it, then start blogging!