E-Portfolio #13

Cyber security is a difficult task to take on. I am trying to carry out cyber security, many lawmakers are trying to create policies and build infrastructure that support our need of security in that area. It is difficult however, because cyber security and the Internet are an ever-changing thing. Creating a policy this year…

E-Portfolio #12

 Cyber technology and advancements made in the field affect us in our day-to-day life. They have made our lives better in many ways but can sometimes cause issues. An example of this is cybercrime. Cybercrime has become a more regular occurrence with the growing number of people using technology every day. Cyber technology has also…

E-Portfolio #11

The overlap between cybercrime and criminal justice is becoming increasingly evident in the more recent decades. The similarities can even be overwhelming at times considering how the two are dealt with daily. For example, in a study by Payne and Hadzhidimova, it was shown that criminologists regularly provide insight into the extent of various forms…

E-Portfolio #10

Security engineers are important in keeping our cyber networks safe. Security engineers are responsible for testing and screening security software and for monitoring networks and systems for security breaches or intrusions. They can often resolve possible causes of security threats early on by looking at things from a security perspective and recommending enhancements to management….

E-Portfolio #9

Computers are arguably the best invention that has come out of the 21st-century. They are used in our day-to-day life to make interactions, communication, and our work easier. As with everything however, there are pros and cons to the use of computers. In some ways, computers have made our lives safer, and in others, it…

E-Portfolio #8

Keeping your computer safe and secure is an important step in protecting your personal and financial information. There are some steps you can take in order to make sure that your computer is safe. Some of these include using a firewall and keeping your software up to date. If you are using windows, windows 10…

E-Portfolio #7

There are many costs and benefits when implementing a cyber security program in a business. When implementing new programs and protocols in a business, the goals are to create a safer environment to transfer, send, and receive data, and to implement new measures of communication between computers inside and outside of the company in a…

E-Portfolio #6

Workplace deviance refers to deliberate, malicious attempts to sabotage an organization by causing problems in the workplace. Studies have shown that organizational factors such as job stressors, organizational frustration, lack of control over the work environment, weak sanctions for rule violations, and organizational changes such as downsizing are causes of workplace deviance. Many times, workplace deviance can occur…

E-Portfolio #5

Legal ways to make money in Cybersecurity: Create a program. YouTube transaction security. Become a Freelance Security Specialist. Enter Bug Bounties. Rate a company’s security system and suggest steps on how to improve it. Study Blockchain. Earn certifications in CISM and CISSP. Create your own cybersecurity company. Use malware analysis and reversing. Rent out a…

E-Portfolio #4

A cybersecurity risk is the potential loss or harm related to technical infrastructure, use of technology or reputation of an organization. In different countries there are different laws and regulations that control the extent of the security and measures taken to ensure proper cybersecurity. In the United States, there are many different cybersecurity risks that…