Publication #10

How do engineers make cyber networks safer?  System security engineers’ main goal is to protect the stakeholders and system assets. This is achieved by deploying tasks in the system life cycle processes with the goal of reducing of terminating vulnerabilities and minimizing the impact of exploiting or triggering those vulnerabilities. Engineers reduce the susceptibility of…

Publication #9

Computers have made the world safer and less safe. First beginning with how computers have made the world safer, with computers we have made air transportation safer, before computers we did not have ways to track the weather or track other airplanes, the navigation system was maps and a compass and looking for landmarks. Nowadays, we…

Publication #8

How can you tell if your computer is safe?  The first thing when purchasing a computer is to create a strong password, it does not have to be long, but a combination of numbers, letters, a capital letter, and symbol to be complex. After, to have extra precautions it is always recommended to encrypt the…

Publication #7

What are the costs and benefits of developing cybersecurity programs in business?   The biggest benefit is the survival of the business or company because if a breach were to occur a lot of domino effect events would happen. Starting with the data stolen, it could be from personal information of customers, employees, or other companies…

Publication #6

Cyber technology has opened more opportunities for employees to do damage to their companies undetected by simply using their computer and access. Workplace deviance occurs in many ways, and everyone has their own objective. At the end all this affects the company and customers. This is the other side of cybercrime, and they called it…

Publication #5

Cybersecurity analyst  Youtuber blogger or influencer   Bug bounty hunter  Ethical hackers get rewards by attacking legally their systems.  Recommendation for improvement after auditing a system  Security consultant  Educating by becoming a cybersecurity teacher.  Creating security tools  Updating new security systems  Research in projects   Identifying vulnerabilities in systems   Testing networks or systems for…

Publication #4

Today’s Cybersecurity challenges are becoming every time more challenging. In United states we are experience an enormous number of spams that can be harmful and nuisance. Most of the spam is sent from a type of malware called “Botnet” that counts for 76% of the spam sent globally. The top countries to host botnets are…

Publication #3

Four ethical issues that arises when storing electronic information about individuals are privacy, access, accuracy and property or piracy.  Privacy can easily be misused once is breached by a 3rd party and if the data is exposed freely on the internet, it can have tremendous negative impact in individuals and potentially reaching their organizations or…

Publication #2

The 4 Odu majors related to cybersecurity I chose are: Leadership, Criminal Justice, Computer Engineering and Sociology.  Leadership major relates to Cybersecurity as the decisions making in the company or organization. Leaders need to be able to communicate with their network team to understand what is required to protect the organization against cyber-attacks from inside…

Publication #1

I am interest in cybersecurity Technology because in today’s world as we move into the future, everything is connected to the internet allowing more systems to exist and there needs to be a control or (police) to manage and control the security of those systems and educating the public to keep being self-aware of the…