Journal Entry #1

Why are you interested in cybersecurity technology? Growing up I’ve always been very caring and passionate about what I do, which is why I have always wanted a job that is focused on helping other people. There was actually many career paths that I wanted to do while growing up but I didn’t really want…

Journal Entry #2

Select four other majors offered by ODU and explain how those majors relate to cybersecurity. There are many majors that relate to cybersecurity at Old Dominion University. Some of those majors are Computer Engineering, Cyber Operations, Cybercrime, and Information Systems & Technology. The Cybersecurity program at Old Dominion University prepares graduates with the skills necessary…

Journal Entry #3

Describe four ethical issues that arise when storing electronic information about individuals. Four types of ethical issues that arise when storing electronic information about individuals are privacy and confidentiality, security breaches, implementation, and data inaccuracies. Confidentiality is when a company is trying to protect the information so that they are able to restrict access to…

Journal Entry #4

 Compare cybersecurity risks in the U.S. and another country. The most common cybersecurity risk in the USA is Malware, Password Theft, Traffic Interception, Phishing Attacks, DDoS, Cross-Site Attack, and Zero-Day Exploits. Malware is a very common form of security threat, malware ranges from stealing information, denying access from programs, deleting files, and spreading itself onto…

Journal Entry #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  Cyber stocks Yacht GPS software that is secure Build an application. E-commerce security Rate a company’s security system and suggest steps on how to improve it Security auditing Engineering for network security Cryptographer Updating security software to avoid breaches…

Journal Entry #6

How has cyber technology created opportunities for workplace deviance? Before we get started, I would like to start off by defining what workplace deviance is. Workplace deviance is described as “voluntary behavior that violates significant organizational norms and in doing so threatens the well-being of an organization, its members or both” (Robinson and Bennett, 1997)….

Journal Entry #7

What are the costs and benefits of developing cybersecurity programs in business? It is very important for businesses and companies to invest in cybersecurity because without it the business may suffer from cyber attacks and data breaches which can cost the business millions of dollars depending on the seriousness of the attack. A data breach,…

Journal Entry #8

  How can you tell if your computer is safe? Keeping your computer safe helps you avoid malware and hacking attempts that are used to steal your personal information. Some tips you can use to protect your computer are first and foremost a firewall. A Firewall is network security that is installed on your computer,…

Journal Entry #9

        Describe three ways that computers have made the world safer and less safe. Technology is a huge part of our daily lives. It has made drastic improvements to our life, and it has made life so much easier in many ways. But there are positive things that come with technology, but there are also…

Journal Entry #10

                                             How do engineers make cyber networks safer? Engineers protect sensitive data against an ever-evolving array of threats by applying their skills in areas like systems architecture, machine learning, modeling, and reverse engineering. They play an essential role in building a more secure future for technologies like self-driving cars and connected medical devices. Systems engineering…

Journal Entry #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? There are a lot of overlaps when it comes to criminal justice and cybercrime. Some of those overlaps are how criminologists define cybercrime, how criminologists explain cyber offending and victimization, how criminal justice…

Journal Entry #12

How does cyber technology impact interactions between offenders and victims? Technology allows us to communicate with other people whether it’s through cell phones, email, video chat, text messages, or social media. However, it also opens a gate for cybercriminals to commit crimes such as harassment, and threats, intimidate others, and cause harm to other people….

Journal Entry #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? I don’t think that you should use predictive knowledge for cyber policy and infrastructure. Predictive knowledge should only be used for estimations and projections but not for anything that is serious. Not every prediction is right, lots of…