How can you tell if your computer is safe? (Journal 8)

There are several measures one can take to ensure the safety of their computer. One of the most important ways to ensure the safety of your computer is by installing antivirus software. Antivirus software is designed to protect your computer Continue reading How can you tell if your computer is safe? (Journal 8)

What are the costs and benefits of developing cybersecurity programs in business? (Journal 7)

Businesses developing a cybersecurity program can help them avoid risks, such as loss of data and financial losses, as well as protecting their assets. However, developing a cybersecurity program has its costs/benefits, with one of the benefits being risk mitigation. Continue reading What are the costs and benefits of developing cybersecurity programs in business? (Journal 7)

How has cyber technology created opportunities for workplace deviance? (Journal 6)

Workplace deviance is defined as “The deliberate desire to cause harm to an organization–more specifically, a workplace.” Cyber technologies have offered opportunities for this kind of behavior to occur in several ways. One of which being common in many workplaces, Continue reading How has cyber technology created opportunities for workplace deviance? (Journal 6)

Comparing cybersecurity risks in the United States and Russia (journal 4)

There are several cybersecurity risks that affect the United States of America. Some of those risks include data breaches, cyber attacks on critical infrastructure, and cybercrime that is targeted towards individuals and businesses. Cyberattacks on critical infrastructure, like the electrical Continue reading Comparing cybersecurity risks in the United States and Russia (journal 4)

Four ethical issues that arise when storing electronic information about individuals (Journal 3)

There are a number of ethical issues that arise when concerning storing electronic information about individuals, primarily in the area of Electronic Health Records (EHR’s). One issue that can arise is privacy and confidentiality. Privacy is the right of an Continue reading Four ethical issues that arise when storing electronic information about individuals (Journal 3)

Four majors that are related to cybersecurity (Journal 2)

Old Dominion University offers several majors that are closely related to cybersecurity. The first of which being computer engineering. In cybersecurity, we reduce the risk of malicious attacks on software, computers, and networks by designing frameworks that reduce said risks. Continue reading Four majors that are related to cybersecurity (Journal 2)