rss search

next page next page close

ASSIGNMENT: Free Write

Create an app that rates software.

Yacht GPS software that is secure

Become a cyber security defender. They help fight against cyber attacks

Educate a company and instruct of the updates periodically

Rebooting systems after an cyber attack

Search for ways to limit risks and vulnerabilities

Educate students on the dangers of cybersecurity 

Creating programs to help secure computers and information

Utilizing resources to limit weaknesses as well as develop solutions

Regenerating information lost after a cyber attack

Install and monitor computer programs

Track suspicious activity within a company’s database

Youth leader of cyber security classes


next page next page close

Module 3 Entry

The word deviance can be defined as the state of withdrawing from the usual standard behavior and moving towards a more negative behavior. This behavior can occur physically, sexually, or socially. Some examples of deviance would be assault, rape, and verbally asserting someone. When talking about workplace deviance, it is defined as the same as deviance, but the behavior occurs in a workplace. An example of workplace deviance is an employee getting fired then proceeding to cause a scene in the workplace afterwards. Another example would be threatening a company via email or from a restricted phone number because something didn’t go your way. Nowadays, technology has increased and there have been a variety of social media platforms developed. This makes it easier for workplace deviance to occur. Deviance doesn’t have to always be in person, it can also occur through the web. This is because the intent is not to hurt them in person, but to hurt them period. An example of workplace deviance can be as simple as making a negative post about a company. Not only does it lower the performance levels, but it also ruins the reputation of the company. Another example of this would be sending an email threatening the company. This is labeled as workplace deviance because it disobeys the company’s expectations. When first arriving on the job or doing the interview process, most jobs tell you their standards and expectations. This poses a threat to companies because it is so hard to find out who is behind the attacks. Most companies receive threats and think they are outside of the company, but realistically employees pose the biggest threat. This is because employees have access to certain documents and servers that outsiders do not. All in all, workplace deviance was probably bound to happen verbally/social, but now it is easier with the use of technology. 


next page next page close

Module 6 Entry

Cyber-policy sets the standards and expectations of behavior within social media. This basically insures businesses and protects them against risks provided by the internet. When the policy is constantly being updated, it provides more security for businesses and a sign of relief to them. Cyber-infrastructure is everyone and everything that makes it possible for a business or organization to succeed.cyber infrastructure contributes to an organization’s success. Without everyone and everything playing their part, the business will not flow as efficiently. This includes data, information, softwares, and people. The thing about technology is that no one truly knows the capabilities of it. Technology is steadily improving and there’s no way to identify all of the advancements and capabilities. The way we should approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge is by using defense as our basis. When referring to defense, I am talking about using security platforms. The proper mindset to have is to be 2 steps ahead of computer hackers. Hackers are constantly working trying to figure out how to break through security blocks. With a “short arm” of knowledge, you never know what coil will happen to you next. Therefore, the best thing to do is to always prepare for the worst. Make sure that there is a plan in place for every bad scenario you can think of. Not only have a plan, but make sure the plan is valuable. The meaning of that is to make sure that the company is informed of the plan and that the plan will protect you against risks. Cyber technology is the whole span of computer systems. Offenders can make victims hurt. Doing damage through a computer is just as hurtful as doing physical damage. Sometimes victims are helping offenders and are unaware of it. For example posting your phone number, address, and emails can lead to offenders using the information to victimize you. The smart thing to do is to keep your information private and stay up to date on everything. 


next page next page close

Module 5 Entry

Computers have become advanced over the years and have had both a positive and negative affect on the world. One way the world has become safer is because of a variety of security developments.  One way is doorbell cameras. These cameras allow homeowners to see the outsider of the house and can be connected to their phones. Some of the cameras are even motion censored. This triggers the camera and sends an alert to the owner’s phone. Another security development made by computers are firewalls. Firewalls detect suspicious activity and deny or grant access to users. This helps protect information within businesses. There are many other security platforms other than firewalls such as private wifi. Another way computers have helped make the world a safe place is it helps doctors in the medical field. An obvious way that they are helpful is that it collects and stores patients data. One way computers can be used is to take x-rays. Another way they can be used is to measure a patient’s heart rate, breathing, and monitor their body. This is helpful because it gives examiners a visual idea of what is going on, rather than making an observation based on what the patient is telling them. On the contrary, computers have also had a negative side. One way is that it provides a threat to business. With the advancements in technology, it has become easier for people to hack systems. This poses a threat to companies who obtain important records, such as the government. This really affects small businesses, because they have a lack of resources and may not be able to obtain the most up to date security platform. Engineers make cybersecurity safer by identifying threats within systems. They test these systems and find what weaknesses are there. They then use their knowledge to find solutions to these weaknesses. 


next page next page close

Module 4 Entry

The cost and benefits can vary when developing cybersecurity programs within businesses. When talking about small businesses, these costs and benefits become more serious. Small businesses usually don’t have a lot of funds to spend. This limits the amount of resources and tools they can afford. When developing programs, funds are needed to purchase certain things. These programs are becoming more expensive because of the included development and advancements included. A benefit of these programs is that it protects the company’s data. This is important because a company files and data can be secured without the fear of getting leaked. For example, private wifi would be a benefit of a cybersecurity program within a business. Another benefit is your company will be up to date with the society. The society is steadily increasing and technology is becoming the basis, these programs will allow you to move within the tech-savvy society.  This will allow businesses to use the internet without worrying about documents, email, and other important information having the opportunity to be hacked. This leads into ways you can tell if your internet is safe. Using private wifi makes your internet and other servers unreachable by outsiders. Another way is to keep your computer softwares up to date. If you have a protection system within your computer, make sure it is updated to the latest version. This will make sure that newly discovered bugs are being fixed and may include new advances within the system. Firewalls would be a good option to install on your computer. It detects suspicious activity and denies or grants access to users. One of the most common mistakes people make is using passwords that are easily discovered. To protect yourself and your internet, use passwords that no one would guess, the password can include numbers, letters, and special characters. 


next page next page close

Module 2 Entry

It seems that as technology increases, there are more and more places where information can be stored. However, storing information isn’t always a good idea. One ethical issue that arises when storing electronic information is the confidentiality of the data stored. Confidentiality is the state of keeping something private. The stored information is believed by individuals to be confidential. However, this isn’t always true. If something was to happen to the database security and information was leaked, this could be bad for individuals. Another ethical issue is breaches within the database. Not only does this affect the company, but it affects the customers. There is a risk of personal information being leaked as well as trust being broken between the company and customers. The third ethical issue is making a change of plans without informing the customers. This not only breaks the trust of customers, but it causes confusion. Customers are told one thing, but another thing is happening. The final ethical issue is the inaccuracies. This is an issue because the data can affect a person’s life more than you expect. For example, an important medical record can be erased, which a patient needs. According to Google, the United States ranks first in cybersecurity. The United States leads, followed by the United kingdom. This statistic is basically stating that technology and privacy has been a problem in the United states. The bigger problem is that technology is steadily increasing. The world is becoming so reliant on technology and it is becoming a part of our everyday life. If we don’t find a way to stop cybercrime and produce better privacy, the rates will steadily rise and the United States will remain in first place. We should be using technology to our advantage. With all the advancements we were able to access , we should look for potential solutions to fix these problems. 


next page next page close

Freewrite activity

When googling my name, I saw a lot of posts that were related to my high school track career and a few graduation posts. Some pictures were even featured that I had no idea were even taken. If others were to google my name, they would see that I was a very accomplished runner. There are multiple people of mine holding medals, as well as pictures with my former teammates. My old ncsa sports profile will even pop up. I think people could also look and see how much of my time was dedicated to track.


next page next page close

Module 1 Entry

Cybersecurity isn’t just about technology, it can be related to other factors as well. My major is psychology. Many people may not know, but psychology and cyber security are related. You can’t fully understand the overview of cybersecurity, without understanding people and the way their mind works. Psychology is the study of the mind and behavior. Taking a psychology course and gaining an understanding of the mind/behavior, will allow cybersecurity workers to gain an understanding on how people’s mind/behavior are affected by the internet. For example, how will seeing suicidal posts affect ones mind. In other words, how the internet affects a person’s thoughts and behavior. One major offered by ODU that is related to cybersecurity is cyber operations. Cyber operations focus on the use of computers and other technologies which are used on all levels. The second major offered by ODU that is related is computer science. The purpose of this course is to gain an understanding of principles of computers. This course will allow graduates to understand how hackers and other negative influencers on the internet complete certain tasks and grant the opportunity to come up with possible solutions. Health sciences is the third major related to cybersecurity. Health sciences include community and environmental health, medical diagnostic, dental hygiene, and a variety of other fields. One way the majors are related is because the technology used in cybersecurity can help with collecting data/records as well as helping with ways to cure sicknesses and diseases. Another way is that you can see how community health is affected by the use of technology, especially with how technology has become so essential in society. The final major related to cybersecurity is business administration. The business administration course allows students to gain the skills and knowledge needed to obtain a successful career, especially if they intend on starting a business. In the current society, technology is almost the basis of everything so it would be beneficial to include technology in a business. Cybersecurity is beneficial because it will allow you to prepare for viruses/threats against your business, as well as provide protection. 


ASSIGNMENT: Free Write

Create an app that rates software. Yacht GPS software that is secure Become a cyber...
article post

Module 3 Entry

The word deviance can be defined as the state of withdrawing from the usual standard...
article post

Module 6 Entry

Cyber-policy sets the standards and expectations of behavior within social media. This...
article post

Module 5 Entry

Computers have become advanced over the years and have had both a positive and negative...
article post

Module 4 Entry

The cost and benefits can vary when developing cybersecurity programs within businesses....
article post

Module 2 Entry

It seems that as technology increases, there are more and more places where information...
article post

Freewrite activity

When googling my name, I saw a lot of posts that were related to my high school track...
article post

Module 1 Entry

Cybersecurity isn’t just about technology, it can be related to other factors as...
article post