Journal #11

Offenders use technology to prey on their victims. They use the internet to hack people and steal their information. Not only do they use the internet to steal information but they use it to stalk and harass others. There are multiple incidents where a woman thinks she is talking to a man and when they…

Journal #10

Cyber security engineers identify threats and vulnerabilities in systems and software, they then apply their skills to develop and implement high tech solutions to defend hacking, malware etc. They perform assessments and penetration testing. Becoming a cyber security engineer comes with a lot of responsibilities. Troubleshooting security and network security, testing and identifying network and…

Journal #9

Computers have many advantages and many disadvantages within this world. Our everyday lives revolve around our computers. With our phones, laptops, and i-pads we are surrounded by technology! One way computers have made our world a safer place is the cameras and security they provide. Without cameras we would not catch half of the crimes…

Journal #8

To keep your computer safe you can use cryptography. Cryptography is the art, science, practice and study of securing communications. It is one of the popular ways to keep your information safe when dealing with computers. Cryptography has useful properties that will ensure your safety. The properties include confidentiality, authentication, integrity, and non-repudiation. Confidentiality is…

Journal #7

Developing some kind of cyber security in your business is important. It protects the company’s data from hackers. Granted cyber security can cost a pretty penny it is worth it. Depending on how serious an attack is on a company, it can cost them up to $4 billion. In the article I read it stated…

Journal #6

Workplace deviance is defined as unethical behavior that violates organizational norms about right and wrong. “As technology has opened up a new space for cyber culture, new forms of deviance and social control has appeared”. An example of work deviance in the cyber security field would be if a company let go one of their…

Journal #5

Carry out security measures to protect company’s networks and computers Yacht GPS software that is secure Bug Bounty Hunters: It’s a program offered to individuals who identify and report bugs back to companies, websites or developers. Educate the rest of the company on security Recommend new security measures Analize Security System Logs, Security Tools, and…

Journal #2

The first major I know for sure that relates to cyber security is Computer Science. Computer Science is the study of computers and programming languages. Because cyber security analysts need to have a deep understanding of how computers, and networks work they are similar. Also the majors have the same type of classes. Another major…

Journal #1

My major itself is cyber security, I planned on working with computers somehow. I was in my junior year of high school when I finally decided on a major. Computers weren’t my favorite thing growing up; I was more into how things worked, so it was a minute before I could officially choose a major. …