Mar 12, 2024

Posted by | 0 Comments

Journal Entry #6

How has Cyber security technology created opportunities for workplace deviance?

To begin with this primary idea of deviance is to think of the definition of deviance to start with. According to the Oxford dictionary, “Deviance is the fact or state of departing from usual or accepted standards, especially in social behavior.” Basically, deviance can be categorized as the notion of violating a set of rules. This can only result in a storm of chaos if implemented due to the fact that it wouldn’t serve one’s reputation or character well.

The main facet of this workplace deviance concept is the interference with cyber technology itself. According to John W. Jones, “examples of cyber deviance include excessive personal use of the internet during work hours, spreading rumors or sharing inappropriate content, unauthorized access to confidential information, and the misuse of the company systems or data.” He has a good philosophy in the sense that he is regarding to the fact that workplace deviance promotes inadequate performance at work leading to cyber security technology failure and mishaps versus success and reaping the benefit of rewards.

This behavior cannot and will never be useful for an organization and will ultimately trump and halt the primary idea of teamwork, innovation for ideas, expanding, etc. a constant misuse of rules set in place can lead to lack of motivation within employers and employees at work, dysfunction within a company, chaos, and lack of growth. It is important for everyone to be aware of this so workplace deviance doesn’t take over partly or even primarily.

Read More
Feb 24, 2024

Posted by | 0 Comments

Journal Entry #7

The costs and benefits of developing cybersecurity programs in business are definitely controversial terms to each other. The benefits would outweigh the costs because protection is more important when it comes to dealing with cyber security. When I have not put cyber security first in terms of protecting my laptop or phone, I paid a high price. I had my accounts accessed without my knowledge and always infection that was very hard to undo. However, when I realize that cyber security programs are worth the cost each month knowing I am protected and safe, I feel secure in this knowing that this is the first step in realizing we need our personal information to be secure because hackers/scammers can get into our confidential information effortlessly if we aren’t taking protection seriously. The cost could come high for those who are in the lower class majority. I am currently struggling financially so it would be difficult to add the cyber security bill to my devices. However, I would rather my information be safe then for it to get constantly breached all the time and accessed without my knowledge.

Data breaches and lack of security happens when we let our guards down and don’t install security methods like Norton, Mcafee, etc…because maybe we don’t want to think the worst of everything such as: “Nobody will get into my information I am going to be fine.” Well, let’s say you leave your door unlocked one day or you leave your laptop somewhere opened and not password protected. This is when a vulnerability arises and an attacker has an opportunity to strike. 9 times out of ten maybe the average person is fine, but not always. It’s important to realize that the benefits do have far greater value than the detrimental repercussions that can occur when we allow ourselves to become vulnerable through a lack of cyber security on our devices.

Read More
Feb 12, 2024

Posted by | 0 Comments

Journal Entry 5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. 

Companies such as Fiverr or other freelancing websites. Consulting is also another way.

Youtube videos showing the latest ways to make money online in cyber security

Bug Bounty Programs

Earn money by researching jobs in cyber security professions that have high pay rates.

Releasing Trades in investment and Cyber Security stock

Stock investment and Sales

Earn money getting a B.S. in IT Technology

Consulting

Upwork

Real Estate business

Individualized coaching

Training courses that I can create online or attend virtually/in person by signing up for.

You can use your own intelligence to guide you into the job you want based on your own passions and skillsets within cyber security IT fields of study.

Read More
Feb 5, 2024

Posted by | 0 Comments

Journal Entry #4: Compare Cybersecurity Risks in the U.S. and Another Country.

Cybersecurity risks can be found in any part of the world located within all country parameters where there are vulnerabilities and even where there are no vulnerabilities present. After reading the article, “Chinese Hacking Operations Have Entered a Far More Dangerous Phase, U.S. Warns,” I have learned that there are countries, such as China, where there are risks in cyber security after doing my own research on this topic. Issues such as cyber theft, intellectual property, and hacking into large databases and security systems is becoming more prevalent in this country as a tactic based on finding means of control. However, hackers are targeting various elements within a company such as infrastructure, water treatment plants, electrical grid, oil and natural gas pipelines, transportation systems, electrical grid, oil and gas pipelines, and transportation systems. Technological harm is primarily only done when a hacker/scammer is able to target a vulnerability that is then executed through various methods of interaction to allow the victim to fall for the trap set initially. Just because there is vulnerability present does not always mean an attack will be easier or harder to maintain or execute for the hacker/scammer. The victim is not always subject to become a proponent to the attack either. It is important to stay alert, prepared, and up to date in cyber security in order to ward off attacks such as these described in China.

Cybersecurity risks have caused a rise in negative consequences for the Chinese government according to the article. The havoc arising from natural environmental causes from the cyber security destruction caused Americans to become unable to get to work, they couldn’t take their kids to school, or get people to the hospital safely. If this could be imagined as a domino effect, it is easy to see that pipeline after pipeline just fell as more destruction carried out throughout the country. These are only a few natural disasters caused. Other natural disasters like telecommunications going down so people couldn’t use their cell phones, people started getting sick from polluted water, trains get derailed, air traffic control systems and port control systems malfunctioning overtime. China is still undertaking those activities, “but this is unique in that it’s prepositioning on critical infrastructure, on military networks, to be able to deliver effects at the time and place of their choosing so that they can disrupt our ability to support military activities or to distract us, to get us to focus on, you know, a domestic incident at a time when something’s flaring up in a different part of the world and they don’t want us facing the foreign aspects of that,” the official said.

https://www.defenseone.com/technology/2024/02/chinese-hacking-operations-have-entered-far-more-dangerous-phase-us-warns/393843/

Read More
Jan 28, 2024

Posted by | 0 Comments

Journal Entry #3

1. Describe four ethical issues that arise when storing electronic information about individuals.

~Some ethical issues arising from storing electronic information about individuals would be bias against the ideas surrounding this, lack of privacy and security for individuals with information stored, discrimination based on an individual’s information being stored, and harassment. Confidentiality is very important for individuals working within a business that applies this concept because it creates a safety net of protection from personal information being exposed un-necessarily. Displaying bias against the idea of having electronic information stored is one of the ethical issues that can arise because people may not want their information stored while others may not have an issue with this. The bias could come from the fact that people who are for the idea may override the people who do not want their information stored if there is more people who are for than against the idea. This idea would lead to a lack of privacy and security for those who don’t want their information stored. However, if more people want this to occur rather than those who are biased against the idea, then their personal information would potentially be exposed. Lets just say, for example, this is a company policy within the workplace that all employees who become managers and supervisors for high ranking companies have to have their electronic personal information stored within a computer system for purposes of technology advancement or for purposes of trust within a company for officials/original organizers can know exactly who they are hiring. In this kind of a situation it would be beneficial to these administrations of top ranking companies to know extra information about their supervisors/managers in order to eliminate issues and hire the ones they deem fit for the position as well. However, if someone did not feel comfortable disclosing this much information due to fears of harassment or discrimination then this could be a problem~

Read More
Jan 27, 2024

Posted by | 0 Comments

Journal Entry #2

  1. Select four other majors offered by ODU and explain how those majors relate to cybersecurity.

The majors offered by ODU that relate to cyber security are Computer and information systems Security/Information Assurance, Computer and Information Sciences, Management Information Systems, and Computer Engineering. Computer and Informations systems major rely upon mathematics, logic, and engineering to support their foundation in computer science. Research done within computer science is grounded on theory, experiments, and engineering methodology. This major allows students to utilize and explore the disciplines listed above to aid in their understanding of computer technology as they are introduced to the foundation of the theoretic basis of computer science with the use of lectures and laboratory experiences. The major of Computer Science in Information and Communication Technology is a major that involves students to have understanding in computer science by entering into a graduate program. Computer Engineering is a major that partakes in providing students the knowledge of how technology works along with how the software and hardware. The Information Systems and Technology program offers a unique combination of business knowledge and technical skills that prepares undergraduate students for success in the highly competitive and increasingly technical business world of the twenty-first century. The major emphasizes the development of business analysis and system implementation skills, which can provide a basis for job entry, career development and flexibility amid the rapid changes in information technology.  There is also another major at Old Dominion University called Cyber Security, which is a program that conveys the skills needed to protect computer systems, hardware, networks, and online data attacks from being compromised. The major focuses primarily on computer science, computer engineering, engineering management, information technology and decision science, information assurance, wireless networking, criminal justice, philosophy and psychology.

Read More