Apr 5, 2024

Posted by | 0 Comments

Journal Entry 8

How can you tell if your computer is safe?

I can tell that a computer is safe when it has antivirus security software installed on it, loads data within a timely manner without too many ads or pop ups on it when using the internet, all updates are installed, there are no viruses within the system, there is no malware or ransomware within the system, and my personal information is safe when using it. Not all requirements need to be met insider for a computer to be safe when using it, but if you want to protect yourself and information, just use two factor authentication for all login information and safely log out of all browsers, websites, and accounts being used. It does more damage to leave valuable information exposed like this than anything really. If there is viruses on a computer, it would be best to factory reset it and clean out the system before using it. If that isn’t possible, maybe using safe browsing options like Firefox are good options. Maybe even picking the incognito option could be smart in these kinds of cases to prevent personal information from being stolen. We are generally safe in this would and don’t have to fear too much, but there are always ways to prepare in the event that we are not safe right? However, needless to say, just make sure you feel comfortable on your computer before using it, get the right antivirus software that’s right for you, and don’t hesitate to reach out to a cyber security professional for assistance and questions.

Read More
Mar 27, 2024

Posted by | 0 Comments

Journal Entry #10

How do engineers make cyber networks safer?

Engineers can track cyber attacks on a network if there is a problem within the network per say a virus has taken control or is causing a bug to infiltrate a slower longevity within the network slowly wreaking havoc across the network. Also, engineers can see if someone has somehow managed to access a network they were not permitted to access. For example, anyone can get into someone else’s WiFi network with a password. However, it’s not only with a password. The primary user of the WiFi network has to accept or deny the foreign associate access to their network. In such cases, bugs and other malicious hackers can get into someone’s personal information somehow and access WiFi password to gain access to someone’s information if they were persistent enough to do so regardless if it was unintentional or maliciously intended. Engineers have the power to track activity within a network and even see the devices using the network and what they are doing while connected to the WiFi network as well. Engineers make sure cyber security is up to date due to the prevalence of a multitude of attacks these days. It is not always negative when an attacker gains control without permission of a network or device, but in most cases it would be better to err on the side of caution and use recommendations provided such as two factor authentication, device management within one’s control center for their specific WiFi network, changing passwords every so often to make sure the same one is not being used, checking for any kind of vulnerabilities creating easy access to hackers/scammers to get into one’s information, etc.

Read More
Mar 26, 2024

Posted by | 0 Comments

Journal Entry 11

Describe three ways that computers have made the world safer and less safe.

Computers have become more widely used in this day and age more so than they ever have. Mainly this is because technology is advancing and computers are used to do basically everything. We need them to type assignments, check emails, communicate with one another, research, learn new objectives, create artwork, design, power points, excel, office, Microsoft word, online college, creating businesses, promotions, social media, etc. Computers are one of our main sources of information and data promotion that allows us to expand our horizon in utilizing a more beneficial yet faster way to receive and promote information in its entirety. With that being said, it’s hard to live in this day and age without a computer when working for any kind of organization or company. Computers make our world safe since we can feel comfortable that our work is being completed in a timely, beneficial manner through its usage. We may feel safe using a computer we trust such as a personal laptop used to store information behind password protected authentication. A computer becomes unsafe when it’s used without a user’s knowledge. For example, a computer becomes unsafe when someone accesses personal information without a user’s knowledge.

I think that it becomes unsafe when someone’s personal information is exposed or files are created without primary user knowledge. This can happen for various reasons being that the attacker primarily wants to create havoc for their own disheveled life to create a reaction within the user or just because hacking is something people don’t give much thought to. Being hacked by someone when your personal information is exposed, vandalized, and used without permission is in fact violating, but even if you have everything protected what can you do at the end of the day if a hacker still manages to access your information on your computer due to their own selfish, greedy desires? As corrupt as it is that is where unsafety lies.

Read More
Mar 12, 2024

Posted by | 0 Comments

Journal Entry #6

How has Cyber security technology created opportunities for workplace deviance?

To begin with this primary idea of deviance is to think of the definition of deviance to start with. According to the Oxford dictionary, “Deviance is the fact or state of departing from usual or accepted standards, especially in social behavior.” Basically, deviance can be categorized as the notion of violating a set of rules. This can only result in a storm of chaos if implemented due to the fact that it wouldn’t serve one’s reputation or character well.

The main facet of this workplace deviance concept is the interference with cyber technology itself. According to John W. Jones, “examples of cyber deviance include excessive personal use of the internet during work hours, spreading rumors or sharing inappropriate content, unauthorized access to confidential information, and the misuse of the company systems or data.” He has a good philosophy in the sense that he is regarding to the fact that workplace deviance promotes inadequate performance at work leading to cyber security technology failure and mishaps versus success and reaping the benefit of rewards.

This behavior cannot and will never be useful for an organization and will ultimately trump and halt the primary idea of teamwork, innovation for ideas, expanding, etc. a constant misuse of rules set in place can lead to lack of motivation within employers and employees at work, dysfunction within a company, chaos, and lack of growth. It is important for everyone to be aware of this so workplace deviance doesn’t take over partly or even primarily.

Read More
Feb 24, 2024

Posted by | 0 Comments

Journal Entry #7

The costs and benefits of developing cybersecurity programs in business are definitely controversial terms to each other. The benefits would outweigh the costs because protection is more important when it comes to dealing with cyber security. When I have not put cyber security first in terms of protecting my laptop or phone, I paid a high price. I had my accounts accessed without my knowledge and always infection that was very hard to undo. However, when I realize that cyber security programs are worth the cost each month knowing I am protected and safe, I feel secure in this knowing that this is the first step in realizing we need our personal information to be secure because hackers/scammers can get into our confidential information effortlessly if we aren’t taking protection seriously. The cost could come high for those who are in the lower class majority. I am currently struggling financially so it would be difficult to add the cyber security bill to my devices. However, I would rather my information be safe then for it to get constantly breached all the time and accessed without my knowledge.

Data breaches and lack of security happens when we let our guards down and don’t install security methods like Norton, Mcafee, etc…because maybe we don’t want to think the worst of everything such as: “Nobody will get into my information I am going to be fine.” Well, let’s say you leave your door unlocked one day or you leave your laptop somewhere opened and not password protected. This is when a vulnerability arises and an attacker has an opportunity to strike. 9 times out of ten maybe the average person is fine, but not always. It’s important to realize that the benefits do have far greater value than the detrimental repercussions that can occur when we allow ourselves to become vulnerable through a lack of cyber security on our devices.

Read More
Feb 12, 2024

Posted by | 0 Comments

Journal Entry 5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. 

Companies such as Fiverr or other freelancing websites. Consulting is also another way.

Youtube videos showing the latest ways to make money online in cyber security

Bug Bounty Programs

Earn money by researching jobs in cyber security professions that have high pay rates.

Releasing Trades in investment and Cyber Security stock

Stock investment and Sales

Earn money getting a B.S. in IT Technology

Consulting

Upwork

Real Estate business

Individualized coaching

Training courses that I can create online or attend virtually/in person by signing up for.

You can use your own intelligence to guide you into the job you want based on your own passions and skillsets within cyber security IT fields of study.

Read More
Feb 5, 2024

Posted by | 0 Comments

Journal Entry #4: Compare Cybersecurity Risks in the U.S. and Another Country.

Cybersecurity risks can be found in any part of the world located within all country parameters where there are vulnerabilities and even where there are no vulnerabilities present. After reading the article, “Chinese Hacking Operations Have Entered a Far More Dangerous Phase, U.S. Warns,” I have learned that there are countries, such as China, where there are risks in cyber security after doing my own research on this topic. Issues such as cyber theft, intellectual property, and hacking into large databases and security systems is becoming more prevalent in this country as a tactic based on finding means of control. However, hackers are targeting various elements within a company such as infrastructure, water treatment plants, electrical grid, oil and natural gas pipelines, transportation systems, electrical grid, oil and gas pipelines, and transportation systems. Technological harm is primarily only done when a hacker/scammer is able to target a vulnerability that is then executed through various methods of interaction to allow the victim to fall for the trap set initially. Just because there is vulnerability present does not always mean an attack will be easier or harder to maintain or execute for the hacker/scammer. The victim is not always subject to become a proponent to the attack either. It is important to stay alert, prepared, and up to date in cyber security in order to ward off attacks such as these described in China.

Cybersecurity risks have caused a rise in negative consequences for the Chinese government according to the article. The havoc arising from natural environmental causes from the cyber security destruction caused Americans to become unable to get to work, they couldn’t take their kids to school, or get people to the hospital safely. If this could be imagined as a domino effect, it is easy to see that pipeline after pipeline just fell as more destruction carried out throughout the country. These are only a few natural disasters caused. Other natural disasters like telecommunications going down so people couldn’t use their cell phones, people started getting sick from polluted water, trains get derailed, air traffic control systems and port control systems malfunctioning overtime. China is still undertaking those activities, “but this is unique in that it’s prepositioning on critical infrastructure, on military networks, to be able to deliver effects at the time and place of their choosing so that they can disrupt our ability to support military activities or to distract us, to get us to focus on, you know, a domestic incident at a time when something’s flaring up in a different part of the world and they don’t want us facing the foreign aspects of that,” the official said.

https://www.defenseone.com/technology/2024/02/chinese-hacking-operations-have-entered-far-more-dangerous-phase-us-warns/393843/

Read More