ePortfolio Entry #6

Cybervictimization Engineers employ techniques to enhance the security of cyber networks. One method involves encrypting data to safeguard it during transmission and storage by converting it into a code to prevent access. Another approach is network segmentation, where the network is divided into segments to impede the spread of cyber attacks. Firewalls function as gatekeepers…

ePortfolio Entry #5

Systems Security Engineering and Cyber Technology To keep your computer safe, follow these simple steps. First, install antivirus software and regularly scan your computer for viruses and malware. Make sure to keep your operating system and apps updated with the latest security patches and turn on automatic updates. Watch for signs of trouble, like slow…

ePortfolio Entry #4

Protecting Business Using Technology Implementing cybersecurity measures, for businesses entails striking a balance between costs and benefits. Costs; Initially setting up cybersecurity protocols requires investments in both hardware and software to combat threats. Additionally hiring experts to design and implement these security measures adds a burden for businesses. Furthermore, ongoing expenses are associated with cybersecurity….

ePortfolio Entry #3

Risk Management and Cyber Technology In the workplace the advancements, in cyber technology have brought about advantages such as enhanced communication, increased productivity and better data organization. However, these developments have also opened up avenues for misconduct among employees. For instance individuals lacking knowledge or proper training may engage in data theft. The anonymity afforded…

ePortfolio Entry #2

Information Technology and Cybersecurity Storing data electronically raises dilemmas. Firstly, privacy concerns come into play. When organizations gather information there’s always a risk of access potentially leading to identity theft or financial harm, for the individuals involved. Secondly the issue of consent is significant. People should have an understanding. Give their permission for the use…

ePortfolio Entry #1

Introduction to Cybersecurity I’m interested in cybersecurity technology because it combines my problem-solving skills with the critical mission of protecting sensitive information and systems from cyber threats, specifically in the medical device industry. Throughout my professional career, I have gained expertise in network security, vulnerability assessments, and the implementation of robust security measures. My experiences…