Journal #8 How can you tell if your computer is safe?

In today’s age people store a lot of sensitive data on their personal computers, such as credit card information, personal documents like birth certificates, social security cards, health information, etc. This is why you should have a in depth defense layer between your personal computer and the internet. Here are some ways listed below on…

Journal #7

What are the costs and benefits of developing cybersecurity programs in business? Cyber security programs can be costly to a business, but you know what can be even more costly, getting cyber attacked and getting your proprietary or confidential data leaked. The effects of a company getting breached can range from losing a couple customers,…

Journal #6

How has cyber technology created opportunities for workplace deviance? As cyber technology is growing so is the opportunities for workplace deviance, also called an insider threat in the cyber world. This can be something as little as playing a silly prank on a coworker or as major as stealing and selling proprietary company information. What…

Journal #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Creating securer encryption Yatch anti-theft device’s Broadcast traffic protection protocols Engineering secure algorithms Reverse softare engineering Secure coding Engineering endpoint protection software Cyber crime prevention USB Protection Random number generator token Identity theft prevention service Threat intelligence sharing service…

Journal #4

Cybersecurity is a key factor when it comes to securing a nation’s homeland. Having the upper hand in cybersecurity can make you have the upper hand when it comes to having a better defense, more intelligence, as well as better technologies. In the United States we are facing multiple threat actors many from that are…

Journal #3 Data Privacy

Describe four ethical issues that arise when storing electronic information about individuals.  Now a days everything you do on the internet there is information is being stored. That information may range from basic session information such as IP addresses, protocols, etc, to personally identifiable information, health information, payment card information, and other sensitive information. This raises…

Journal #1

Why am I interested in cybersecurity technology? Ever since I was a little boy, I’ve always had an interest in computer technology, I built my first computer at the age of 12 and I built many more after. I initially got interested in cyber security because the vast number of ways people figure out how…