Computers have revolutionized the world in many ways, making our lives easier and more efficient in various domains. However, the same technology can also pose new risks and challenges that need to be addressed. Here are three ways that computers have made the world safer and less safe: Computers have made the world safer by…
Category: Uncategorized
Journal #8 How can you tell if your computer is safe?
In today’s age people store a lot of sensitive data on their personal computers, such as credit card information, personal documents like birth certificates, social security cards, health information, etc. This is why you should have a in depth defense layer between your personal computer and the internet. Here are some ways listed below on…
Journal #7
What are the costs and benefits of developing cybersecurity programs in business? Cyber security programs can be costly to a business, but you know what can be even more costly, getting cyber attacked and getting your proprietary or confidential data leaked. The effects of a company getting breached can range from losing a couple customers,…
Journal #6
How has cyber technology created opportunities for workplace deviance? As cyber technology is growing so is the opportunities for workplace deviance, also called an insider threat in the cyber world. This can be something as little as playing a silly prank on a coworker or as major as stealing and selling proprietary company information. What…
Journal #5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Creating securer encryption Yatch anti-theft device’s Broadcast traffic protection protocols Engineering secure algorithms Reverse softare engineering Secure coding Engineering endpoint protection software Cyber crime prevention USB Protection Random number generator token Identity theft prevention service Threat intelligence sharing service…
Journal #4
Cybersecurity is a key factor when it comes to securing a nation’s homeland. Having the upper hand in cybersecurity can make you have the upper hand when it comes to having a better defense, more intelligence, as well as better technologies. In the United States we are facing multiple threat actors many from that are…
Journal #3 Data Privacy
Describe four ethical issues that arise when storing electronic information about individuals. Now a days everything you do on the internet there is information is being stored. That information may range from basic session information such as IP addresses, protocols, etc, to personally identifiable information, health information, payment card information, and other sensitive information. This raises…
Journal #2 Select four other majors offered by ODU and explain how those majors relate to cybersecurity.
Because of the vast number of technologies and societal aspects that require the security component there are many other majors that can be related to cybersecurity in one way or another. First let’s look at the major offered by ODU called Information Systems & Technology. This major focuses on integrating the new technologies and systems into…
Journal #1
Why am I interested in cybersecurity technology? Ever since I was a little boy, I’ve always had an interest in computer technology, I built my first computer at the age of 12 and I built many more after. I initially got interested in cyber security because the vast number of ways people figure out how…