How to make money with cyber security

Create online cyber security training progams

Youtube channel centered around cyber security

Become a freelance cyber security consultant

Ethical hacking

Rate business’ cyber security policies

Security auditing

Engineering

Commercially used applications

Utilize attack reports to improve security policies

Risk management

Individual coaching

Technology support

Yacht GPS software that is secure

Storing Electronic Information About Individuals

Storing electronic information about individuals can create ethical issues that should be addressed. The first is privacy. Companies in social media, shopping, medical and finances store critical personal information. This can range from banking information, contacts, medical information and behaviors. Some companies may sell this information or some companies may have a network that could be susceptible to attacks. Emphasizing on cyber attacks, another ethical issue, when a company stores information like mentioned before they may or may not be directly responsible for that information. If the organization is attacked, the PII of users is exposed and could be stolen to be used against unsuspecting users. Another ethical issue is how information is transferred. This can include if or not that information being transmitted and received is encrypted. If not it could be stolen. also in instances of power outages or equipment failure, information can be corrupted or lost.

Cyber Security and its relation to other majors

One of the four majors I will compare cyber security is the major I am pursuing, which is computer science. Cyber security is a very specific branch of computer science. Similar to how cyber security is a interdisciplinary effort, computer science is as well with cyber security acting as on of those disciplines. While computer science is more centered around building computers and software systems, cyber security is focuses on safeguarding those systems.

Another major to compare to cyber security would be information technology. IT is another field that encompasses a wide array of topics. CS being one of those. IT has a large need for cyber security which is why it is included in IT programs. Safeguarding information is a key objective in cyber security.

Two more majors I like to compare with CS is both Sociology and Philosophy. These majors both ask the how, why and what. These questions together can be used in cyber security to determine why a cyber attack may occur, how it will occur, and what will the cyber attack be targeting.

Why are you interested in cybersecurity technology?

I must admit that prior to beginning my time at ODU, cybersecurity was not on my RADAR as a possible career option. But entering the Computer Science field as a beginner, any field relating to the subject does start to pique my interest the more I dive in. During my time in the United States Navy Cyber Security was and is a constant responsibility of every service member, DOD contractor and federal government employee. Most of my limited experience with cyber security is centered around being aware of possible ways a foreign advisory can attempt to gain access to information with the intent to harm or exploit the United States national security efforts.

An element of this topic that has become to interest me is the concept of red and blue teams. Creating security measures both physically and digitally. Two teams working opposite each other to accomplish an overall goal of a stronger security system. This is very similar to the training I participated in during my entire Naval career.

I look forward to this Fall semester in this class. I would like to learn more about this specific field and think of it as a possible career option.