#9 Three ways that Computers have made the World a Safer and Less Safe Place

Computers have had a very significant impact on safety in the world, both positively and negatively. First, positively, computers have been able to drastically improve emergency response times and how they’re handled. These computers enable faster and more efficient communication and coordination during all types of emergencies. They can also help reach the general public much faster in the case of large scale emergencies such as natural disasters, terrorist attacks, or anything other large scale emergency, and it will allow society to react much faster. The way computer make our life safer is because of the improved transportation safety. What i mean by this is all of the extra safety features that are now in things such as cars, planes and boats. Computers have given us technology such as radars and gps so that no matter where we are, we can always find our way back. For cars, there is also technology such as anti-collision, automatic braking systems, lane departure warnings, and recently there’s even cars that can drive on their own. Now on to some negative things that computers have brought to the safety of our society. First of all being major privacy concerns. The widespread use of computers make it easier than ever before to gain most of an individuals sensitive information if they aren’t careful. Things such as surveillance, data-mining, and also profiling by large organizations can infringe on an individuals privacy rights. These can lead to things such as identity theft, fraud, unauthorized surveillance, and other privacy right violations. The next negative in safety that has come with computers it just how dependent we really are on them. Every single day, most of our time is spend on a computer whether we realize it not. From school work, to simply talking to our best friend or family, alot of the time we use a computer to do those things now. This heavy reliance on computers can be exploited by cybercriminals and has been. Critical things such as water treatment plants and power grids have been shut down due to these cybercriminals going after the computers that are in charge of them, this can lead to very major disasters.

#8 How can you Tell if your Computer is Safe?

When you get a computer, the most important thing to do to make sure your computer is safe is to download antivirus and antimalware software, but make sure its from a trusted source so that you don’t accidentally download the thing you’re trying to protect your computer from instead. If you have both of these, make sure to keep it updated as technology is always evolving and these systems are also always evolving. Make sure to use these systems to always scan for any unwanted data. The next thing to do so that your computer can be safe is to install a firewall so that no one can breach into your system, or at least it will make it significantly harder for any attacker to do so. It will monitor all incoming and outgoing network traffic. The next thing you can do is make sure you’re keeping up with your updates as I said before, technology is always evolving and if you don’t stay on top if it, not updating your systems can cause no holes and risks to open up. One of the most important but simple things to remember thought it making sure that you use strong and not guess-able passwords for all of your data, including getting into your systems. Making sure that you have a strong password can automatically eliminate one of the largest reasons for people losing their sensitive data today. Also making sure that at all times you have a secure network connection is also a big part of it. Ensuring your Wifi is secure by using encryption, changing the default router passwords, and enabling network firewalls are all apart of this. A very important thing that most people also undermine is the use of backing up data. Regularly backing up data on something like an external drive, cloud storage, or a backup service. This is important because if you ever lose all your data for any reason, youll be able to get it all back easily because you simply backed it up.

#7 Costs and Benefits of Developing Cybersecurity Programs in Business

When developing programs in a cybersecurity business, there are plenty of costs and benefits to it. We’ll starts with the costs, otherwise known as the cons. First of all of course, is the initial investment, not just monetarily but also time wise. This also includes technology, software, hardware, infrastructure. All of this goes into purchasing things such as firewalls, anti-virus software, detection systems, encryption tools and plenty of other security solutions that would be necessary. Next is the training and education of new employees. Employees must always be taught new things, especially in cybersecurity because technology is always evolving. These new things that need to be taught include every evolving technology, new security protocols, and to stay updated on all emerging threats. This costs a great deal of money if you want your employees to get the correct, most up to date, and best education and training all around. One of the last but most important investments is risk management. Investing into risk management tools that include regular security audits which are used to identify any vulnerabilities that can be breached that would need financial resources to fix. Next is the Benefits. First, is protection of assets, which any good and established cybersecurity program will have. A cybersecurity program will protect any valuable customer data, intellectual property, financial information, and reputation from any cyber attack or breach. Next is good customer trust, which will needed to be built in all good cybersecurity programs. By creating good trust and reassurance with a consumer, it will create trust and loyalty by the customer in return to the company, and this will lead to this always remaining and also more potential clients due to the customer bragging. The last is enabling innovation, because a safe IT environment will bring new innovation to the program because it will provide a safe space to employees to explore different technologies.

#6 How Has Cybersecurity Created Opportunities for Workplace Deviance?

Cybersecurity has created many opportunities for workplace deviance. One of the first being that people can easily slack off in the workplace because they are always on a device. Because cybersecurity professionals are always on a device, it is quite easy for them to go on platforms in which they shouldn’t be on while working. These workers could be doing thinks such as roaming social media, playing online games, doing some online shopping, or even watching movies. This leads to a waste of company hours which causes a huge waste in company resources and possibly a backlog of work if it doesn’t get done. Another very common one can be something such as cyber bullying, because cyberbullying isn’t only for young teenagers and adults. Employees have access to plenty of channels such as email and other instant messaging services which make it possible for cyberbullying across all platforms. This can happen to other coworkers and can quickly lead to a toxic work environment which can then lead to less production. Another one that may be the largest of them all is data theft along with unauthorized access. Employees can misuse their access to sensitive data by either possibly stealing it for themselves when there’s no one else around to see them, or by granting someone else outside of the organization access to the sensitive data. Next is the possibility of social engineering attacks. Any employee is subject to the possibility of being blackmailed or some other way to be manipulated through any social engineering tatic. Some of these tactics include phishing, whaling, pretexting, or anything else in order to disclose sensitive information or perform unauthorized actions that compromise any company secrets. The last is time theft, in which employees can manipulate digital time systems that track how much time they work in order for themselves to get a higher paycheck and more hours.

#5 Legal Ways to Make Money in Cybersecurity

C – Cybersecurity Consulting

Y – Youtube Channel

B – Bug Hunting (Bug Bounty Programs)

E – Encryption Software Development

R – Remote Access Security

S – Software Development

E – Ethical Hacking

C – Create app that rates software

U – User awareness training

R – Risk assessment Services

I – Incident Response Planner

T – Threat Intelligence Analysis

Y – Yield Management System Security

#3 Ethical Issues that Arise When Storing Electronic Information on Individuals

The four main issues that arise when storing electronic information on individuals include privacy, security, accuracy, and access. The first one, privacy, is one of the most important and well known among society because no one likes an invasion of privacy. Electronic information that includes privacy could be things such as personal details such as names, addresses, and financial and health records. It is considered that everyone has their own right to privacy, so obviously no one would want this right taken. These ethical issues arise when you think about how data is collected, distributed, stored, and protected from foreign cyber attacks. The next is security, which is important because organizations and individuals must ensure the security of electronic information which is crucial in a world full of ever growing technology. The ethical issues that arise with security is when data is breached by outside organizations or individuals and data is stolen. This can happen for a multitude of reasons such as poor cyber policy, poor security measures, or inside personnel. These data breaches can lead to identity theft, financial theft, and other harms to individuals. To make sure security breaches have less a risk of happening, organizations must improve their security measures, constantly update systems and technologies, and swiftly notify individuals or other organizations of a breach. The next is accuracy, which is important because maintaining accurate and reliable records electronically is needed when making decisions and wanting to provide good service. Any ethical concerns that arise here include incorrect data, when its incomplete, or outdated. Organizations must be sure that their data is accurate and must ensure the integrity of stored data. The last is access, because individuals may have limited control over how their data is used, stored, and distributed, which can lead to concerns about consent and how their information is used. Organizations must be transparent about their data practices, along with providing individuals information about the data use, and must respect their rights to their data and how they can access it.

#2 Majors that Closely Relate to Cybersecurity

Currently, i’m majoring in Cybersecurity at Old Dominion University, and to best know my major i should know the majors that relate the closest to it, which is exactly what i’ll be talking about. The first and probably most related to cybersecurity is computer science. Computer science is fundamental to cybersecurity and most computer science majors can easily switch to cybersecurity if wished. It covers programming, algorithms, and other skills that are needed to get a cybersecurity degree. Another degree that could be closely related to cybersecurity and even computer science is computer engineering. Computer engineering is combining the likes of computer science and electrical engineering in order to provide a good understanding of software along with hardware. These two understanding are very important when creating and designing safe and secure systems while also being aware of any vulnerabilities and risks of a system. The third major ODU offers that’s close to cybersecurity is computer and information systems. Information systems majors focus on the design and overall management of information technology systems within organizations. This includes security policies, risk management, and also ways to protect and keep safe private information within an organization. The last major i’m including may not seem similar at first, but with the right explanation, it definitely is, this major is criminology. At first glance they are in two completely different fields, but when you understand how the goal of both majors is to understand and address criminal activities. The understanding of criminal behavior and principles can greatly increase the effectiveness of how people in cybersecurity combat cyber threats and can better minimize risk by knowing their enemy, just like in criminology.

#1 Why am I Interested in Cybersecurity Technology?

I’m interested in Cybersecurity Technology because I know this course will really expand my understanding of many things I will need to master in the future in order to get my degree and have a long and good career. I wish to be an expert in my field and it will allow me to stay updated on all of the latest advancements, technologies, and tools which will give me the best opportunity to excel in my field. In a field that is always changing, its important to always stay caught up because new technology is always coming out, this is exactly why taking Cybersecurity Technology is a great option, because I’ll never fall behind and also I’ll always be on top of employers lists as long as i stay up to date. It will also help me learn to adapt to this always changing environment of Cybersecurity. I’m also interested in it probably for the same reason a lot of other people are in it, which is for the compensation. Cybersecurity is on the rise as one of the most needed jobs in not just the United States, but the world. With all of the new technology coming out so fast like I previously stated, which is good in a sense, but with all good comes a bad, in this case its hackers. As easy as it is to make new technology and apps, its just as easy if not easier to get rid of it or use that technology against the creators, so this is why in this day in age, it is such a sought after profession from governments and companies that because there is such a high demand and not enough supply, the pay is very good, which is a very standout factor to any young student. For all of these reasons, I’m very interested in Cybersecurity Technology and all that it comes with, because I know that I can make a good fun career out of it, while also being ethical and helping people that need it stay protected from outside interferences and anyone wanting to use technology in an unethical way.