Take fifteen minutes and find out everything you can about yourself by Googling your name. What would others learn about you? The first thing I started off with was just googling my first and last name, but nothing came up. After this first attempt I added “Chesapeake, VA” to the search and then was able…
Journal #6
1. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? 2. How does cyber technology impact interactions between offenders and victims? Cyber policy is constantly changing/upgrading and because of these changes, so does the infrastructure that is built based on these policies. Since there is no way…
Journal #5
Describe three ways computers have made the world safer and less safe. How do engineers make cyber networks safe? Since modern technology, specifically computers, have advanced our world has become safer in some aspects but new threats have risen from this technology as well. There are several ways that computer have made the world safer,…
Journal #4
What are the costs and benefits of developing cybersecurity programs in business? How can you tell if your computer is safe? Since there has been a rise in cybersecurity awareness in America, many business have now developed their own cybersecurity programs and taken steps towards protecting their information. Yet, there are still many small businesses…
Journal #3
How has cyber technology created opportunities for workplace deviance? As cyber technology has grown, so has the workforce and the problem that come along with them. The difference between technology and humans is that humans have free will and tend to stray from the set of rules they are given, also known as workplace deviance….
Module 3 Free Write
Constantly update software for a company. You can become a professional hacker to check companies systems. Become a cryptographer and code and decode messages. Ensure that data is protected from hackers and other threats. Run cloud security for some company. Security software developer. Establish your own cybersecurity company. Create a cybersecurity layout with roles and…
Journal #2
Describe four ethical issues that arise when storing electronic information about individuals. Compare cybersecurity risks in the U.S. and another country. Throughout the years technology has grown exponentially and so has storage of consumers’ information. Many companies and businesses storing electronic information about individuals have new and improved ways to store data, but there are…
Journal #1
Currently I am a cybersecurity major at Old Dominion University, my major does not just relate to cybersecurity technology, but is the essence of what it is made up of. As a cybersecurity major, I am and will study several different fields throughout my educational career in order to better understand the field of cybersecurity….