Jan 28, 2024

Posted by | 0 Comments

Journal Entry #3

1. Describe four ethical issues that arise when storing electronic information about individuals.

~Some ethical issues arising from storing electronic information about individuals would be bias against the ideas surrounding this, lack of privacy and security for individuals with information stored, discrimination based on an individual’s information being stored, and harassment. Confidentiality is very important for individuals working within a business that applies this concept because it creates a safety net of protection from personal information being exposed un-necessarily. Displaying bias against the idea of having electronic information stored is one of the ethical issues that can arise because people may not want their information stored while others may not have an issue with this. The bias could come from the fact that people who are for the idea may override the people who do not want their information stored if there is more people who are for than against the idea. This idea would lead to a lack of privacy and security for those who don’t want their information stored. However, if more people want this to occur rather than those who are biased against the idea, then their personal information would potentially be exposed. Lets just say, for example, this is a company policy within the workplace that all employees who become managers and supervisors for high ranking companies have to have their electronic personal information stored within a computer system for purposes of technology advancement or for purposes of trust within a company for officials/original organizers can know exactly who they are hiring. In this kind of a situation it would be beneficial to these administrations of top ranking companies to know extra information about their supervisors/managers in order to eliminate issues and hire the ones they deem fit for the position as well. However, if someone did not feel comfortable disclosing this much information due to fears of harassment or discrimination then this could be a problem~

Read More
Jan 27, 2024

Posted by | 0 Comments

Journal Entry #2

  1. Select four other majors offered by ODU and explain how those majors relate to cybersecurity.

The majors offered by ODU that relate to cyber security are Computer and information systems Security/Information Assurance, Computer and Information Sciences, Management Information Systems, and Computer Engineering. Computer and Informations systems major rely upon mathematics, logic, and engineering to support their foundation in computer science. Research done within computer science is grounded on theory, experiments, and engineering methodology. This major allows students to utilize and explore the disciplines listed above to aid in their understanding of computer technology as they are introduced to the foundation of the theoretic basis of computer science with the use of lectures and laboratory experiences. The major of Computer Science in Information and Communication Technology is a major that involves students to have understanding in computer science by entering into a graduate program. Computer Engineering is a major that partakes in providing students the knowledge of how technology works along with how the software and hardware. The Information Systems and Technology program offers a unique combination of business knowledge and technical skills that prepares undergraduate students for success in the highly competitive and increasingly technical business world of the twenty-first century. The major emphasizes the development of business analysis and system implementation skills, which can provide a basis for job entry, career development and flexibility amid the rapid changes in information technology.  There is also another major at Old Dominion University called Cyber Security, which is a program that conveys the skills needed to protect computer systems, hardware, networks, and online data attacks from being compromised. The major focuses primarily on computer science, computer engineering, engineering management, information technology and decision science, information assurance, wireless networking, criminal justice, philosophy and psychology.

Read More
Jan 15, 2024

Posted by | 0 Comments

Why am I Interested in Cyber Security?

Cyber Security fascinates me to a degree because it seems to be a prevalent issue running rampant across the world through the use of technology. As artificial intelligence, emotional intelligence, and general construction of current day technology advances, it poses a risk to its users if they are proponents in the development of technology and the actual matter of using modern day technology. Due to the threats that are currently underway and posing as potential negative impacts to users it is important for all technology users to keep cyber security at the forefront of their minds when using technology of personal purposes, business personnel, etc.. in order to protect oneself from hackers gaining access to sensitive information online that could be detrimental to one’s reputation and success if taken into the wrong hands. By learning the various ways to protect oneself from malicious software, ransomware, click bate, hacking, online scams, etc, it is critical to utilize the resources provided in cyber security to protect oneself from dangerous and harmful malware/viruses and one’s own personal information.

If it only takes one harmless click on a link, website, text message, or email, to lead one to the detrimental effects of experiencing a cyber attack, wouldn’t we all want to take precautions to prevent this from occurring? Within the blink of an eye it can take only seconds for sacred personal information to become leaked/accessed if one is not careful about what they are browsing and clicking on when using the internet. According to the Course 10: Cyber Threats article in module 1 from the cyber security course at Old Dominion University, it explains that, “protecting your IT infrastructure and data involves the development and implementation of appropriate and effective safe-guards to ensure delivery of critical infrastructure services.” By learning the targeted methods of a cyber attack and how hackers use these methods to gain access to one’s personal/sensitive information online is critical in developing safeguards and parameters to prevent an attack from occurring initially. I want to prepare myself by developing a basis of knowledge around cyber security and what I can do to protect myself and my children’s information online so it doesn’t;t get into the wrong hands and accessed easily. By being prepared and knowing the warning signs, I can protect our information online and safe guard it by utilizing the methods provided to me when learning about Cyber Security.

Read More