Journal # 7

Unless you’re hiding under a rock or living off the grid cyber technology has a footprint in everything we do today from banking, to exposing your personal information and national security. Trying to avoid offenders has become the obstacle of everyone today but the game isn’t fair if one side is playing by a different…

Journal # 6

     Engineers make cyber networks safer by constantly creating, researching, and analyzing every network that is available to them. You would think, since the network built that everything is done, but that doesn’t mean that the task is complete. One phase of this process is the protection of the network, cybercriminals are always looking to…

Journal # 5

     There is no true way to tell if your computer is truly safe because there are viruses and malware out there that can’t be detected until it’s too late. What you can do is keep up with preventive updates that will combat any known attacks that may be floating around the web that has…

Journal # 4

What are the costs and benefits of developing cybersecurity programs in business?      The cost of developing a cybersecurity program depends on what the company is willing to spend to protect the system. Each company is given the standard foundation on what’s needed to protect their infrastructure but cut corners on the spending budget. Most…

Journal # 3

     Deviance is committing acts that are not usual or acceptable in society today. So, when you throw cyber technology into the mix, you’ve entered a realm that has multiple attack avenues that could be harmful to a company. When you have an employee that decides to cause damage to the company using cyber technology,…

Journal #2

Describe four ethical issues that arise when storing electronic information about individuals.      The four ethical issues that arise when storing electronic information about individuals are Security Breaches, System Implementation, Data Inaccuracies, and Privacy and Confidentiality. Security Breaches – Occurs when someone that isn’t authorized breaks into a system to obtain information. System Implementation –…

Journal #1

I grew up in an era where all your information was in the library or if your parents had jobs, you could afford your own personal set of encyclopedias. So, when the first computer was sold and the internet was created, I was hooked.  Since the purchase of my first computer, I’ve always be fascinated…