Entry #1
My major relates to cyber security because my major is cyber security. I do not know which direction I am going with my major yet or what I desire to do specifically but considering my major is basically cyber security technology itself, I’d say it has a lot to do with it. I would say that Cyber crime, computer engineering, information systems and technology, and technology education are all majors that relate to cyber security. Cyber crime relates to cyber security because both majors are very similar but the only difference is that cyber crime focuses on the crime aspect of cyber security. Computer engineering is similar because both majors deal with computers and learning how to use them. Although information systems and technology kind of differs, it relates because you learn more about how computers operate. Technology education relates in the same way that information systems and technology does.
Entry #2
Four ethical issues that arise when storing electronic information about individuals are privacy and confidentiality, security breaches, system implementation, and data inaccuracies. When storing information in computers there is always a risk that the info will not be kept confidential for numerous reasons. Security breaches could happen and all the information could be lost. If the system in not built correctly that could cause problems down the line as well. Data inaccuracies are likely as well and that can be due to it being inputted wrong or glitches in the system. Some people would say that other countries are ahead of us when it comes to technology and to a certain extent, I agree. Cyber security in the United States is not as advanced as it is in other countries.
Entry #3
It is safe to say that businesses are growing by the day. Small businesses, well known businesses, large corporate companies, etc. As the world becomes more technologically advanced businesses seem to follow suit a become tech savvy as well but doing that comes with pros and cons. Some benefits of businesses becoming more tech savvy are that it can draw in new customers, give them an easier way to store their information, and give them a chance to retrieve information if lost. Some costs that come with developing cyber security programs in businesses are that it can cost more, your information may not be completely safe, and you can have a lot of glitches. You can tell if a computer is safe by doing virus checks, tests, security breaching checks, etc.
Entry #4
Computers have had a huge affect on the world. At one point we did not even have them but in a way they have made the world safer and unsafe at the same time. They have made the world unsafe because it has given criminals a new hobby, all of your personal information could be leaked, and you could lose a lot of money. Computers have made the world safer because for the most part all of your personal information could be conveniently kept, the ability to catch criminals has become quicker and easier, and they also give you a faster way to illustrate problem solving abilities. Engineers make cyber networks safe by keeping their networking and computer systems safe from hackers. They also keep important data away from hackers who find ways to break in to databases.
Entry #5
Considering cyber attacks are a common thing these days it is important for businesses to determine what infrastructure and policies they have to protect themselves. It can be pretty difficult to to determine a policy given the fact that technology is always evolving but risk assessment can be helpful when determining policies. There are so many things to be considered when figuring out a policy. For example, the importance of the information being kept for the customer is a factor. Focusing on when an attack is going to occur rather than if one occurs can help a lot as well. Honestly preparation is the main focus. Cyber technology impact interactions between offenders and victims because offenders are able to target their victims through the internet or they are able to steal important information from the internet and victims are set up because their social media platforms can share something without consent or share something that was supposed to be private, publicly.
Leave a Reply