Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.
Consultant for an organization
Your level of knowledge in the field can translate to a higher salary
Bug bounties
Encryption techniques
Risk management and mitigation
Security specialist
Entry level salary compared to other professions
Certifications you can earn to increase your annual salary
Understanding architecture and controls
Risk assessment surveys conducted on the behalf of a company
Intrusion Detection
Training used to further your level of knowledge
Yearly salary expectations compared to other professions
How has cyber technology created opportunities for workplace deviance?
The term deviance originates from the study of statistics, where a deviation is a variation of the mean. It is a behavior that deviates from the standards in a society. Deviance can manifest in a multitude of different ways throughout the workplace. In regards to cyber technology, it could be an individual abusing their assigned roles to look up information on other employees. The information these individuals could have access can cover everything from salary to social security numbers. Once this information is obtained, it can then be stored for personal use, or sold and used for identity theft. Deviance could also manifest through a disgruntled employee who has database management roles, this individual could deliberately alter information and ruin the integrity of the data before leaving the company. Or someone who believes they are about to be fired could utilize their system administration role to cripple a company’s ability to function before they are let go. In addition, you could also have an incompetent employee who inadvertently releases confidential information or alters data. Another form of workplace deviance could be disguising your traffic by utilizing a VPN or proxy server to disguise your traffic to view pornography or other questionable material while at work. Even worse, an employee could be a victim of extortion by a third party. This individual could find himself in a position where an individual or organization has information that could put his livelihood in jeopardy if released, and in turn, this individual is put into a compromised position where he is required to perform an action that could adversely affect his employer. An example of this could be intentionally uploading malware, sending confidential information to a third party, or intentionally altering data and thus effecting the integrity of the information being stored. Unfortunately, there are a multitude of ways that employees can deliberately or inadvertently expose data or sensitive information.
References
Charlier, S. D., Giumetti, G. W., Reeves, C. J., & Greco, L. M. (2017). Workplace Cyberdeviance. The Wiley Blackwell Handbook of the Psychology of the Internet at Work, 131-156. doi:10.1002/9781119256151.ch7