ePortfolio entry #7

How does cyber technology impact interactions between offenders and victims? How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Cyber technology makes it difficult for victims and law enforcement to identify and apprehend perpetrators since they can hide behind online anonymity or pseudonyms. Knowing that their genuine…

ePortfolio entry #6

How do engineers make cyber networks safer? What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? There is a lot of overlap between cybercrime and criminal justice. To handle offenses committed online, legal principles, investigative methods, and enforcement actions are applied. In…

ePortfolio entry #5

How can you tell if your computer is safe? Describe three ways that computers have made the world safer and less safe. ensuring that reliable antivirus and anti-malware software is installed on your computer and is updated on a regular basis. These programs aid in defending against a variety of dangers, including as spyware, ransomware, and…

ePortfolio entry # 4

What are the costs and benefits of developing cybersecurity programs in business? Strong cybersecurity measures prevent unwanted access to sensitive data, thereby defending the company and its clients. Improved data protection reduces the risk of financial and reputational damages from data breaches while fostering confidence with stakeholders, partners, and customers. Financial losses brought on by…

ePortfolio entry #3

How has cyber technology created opportunities for workplace deviance? Without a doubt, cyber technology has revolutionized the workplace, offering a host of advantages like improved productivity, connectedness, and teamwork. But it has also made room for workplace deviance, as workers use digital technologies to support unethical or disruptive behavior. Cyberbullying is when coworkers are harassed,…

ePortfolio entry #2

Sensitive personal data is frequently collected and stored in electronic form. People may have concerns regarding privacy if they don’t know how their data is being used or if it can be accessed by unauthorized parties. One of the cornerstones of ethics is the respect for people’s privacy. Trust can be damaged and privacy can be…

ePortfolio entry #1

Since I liked studying cybersecurity in high school, I decided to major in it. ODU offers majors in mechanical engineering, business, electrical engineering, and psychology. Cybersecurity has a strong link with these majors. Mechanical engineers receive training in analyzing intricate systems and the interactions between various parts. This ability is useful in cybersecurity for understanding…

Write-Up: The CIA Triad

Nicole Selo-OjemeCYSE 200T09-17-22Prof. Kirkpatrick Write-Up: The CIA Triad The CIA triad, generally known as confidentiality, integrity, and availability, is a conceptcreated to direct information security policies inside an organization. To avoid confusion with theCentral Intelligence Agency, the concept is sometimes commonly referred to as the AIC triad(availability, integrity, and confidentiality). Confidentiality is intended to protect…

DISCUSSION BOARD: Protecting Availability

At my CISO job, let’s pretend I need to defend a bank. Only 20 people can use the bank’s systems concurrently. One morning, 25 users attempt to log in simultaneously, causing the system to crash. I would grant access to 30 users at a time when the machine booted up a backup. The bankers then…

Discussion Board: The NIST Cybersecurity Framework

One organization might decide to implement the Framework tiers to outline desired risk management techniques. Framework can be used to discover opportunities to strengthen and convey its management of cybersecurity risk while aligning with industry practices. Another organization may utilize the Framework’s five Functions to assess its overall risk management portfolio.  An organization without a…