Week 9-Cybersecurity

The example of bad online behavior I can think of has to do with a math teacher from my junior high school. The year we were in 8th grade all the teachers received their own iPads due to a technology grant from the state. She was caught sending inappropriate photos from her school iPad. She was at school when she sent them. I believe she was caught by accidentally cc-ing a fellow staff member in the email. I mean I’m not sure why she would think she wouldn’t get caught, but nonetheless still super weird. She was fired and her reputation was extremely damaged. She moved away and I don’t think she has taught since. Other than being fired, there were no legal actions taken. Practically speaking, I think its self-explanatory that this is a major no, no-especially at work, with young kids! Hopefully, I think she learned her lesson. Spending all that time and money in college to get the degree you need to teach children and then throwing it all away, literally, for that makes absolutely zero sense to me, but that a decision she has to live with every day.

Week 8 Midterm Research Project-Privacy, Security, Hacks, and Leaks

  1. Know your enemy: As of Summer, 2020, what are 5 sources/types of potential digital threats to your organization. Examples include external malicious actors or internal human error. Provide a thorough description and examples; be specific.
    1. Cyber terrorists- target businesses, state machinery and critical services that would cause the most harm when tampered with, usually for political interference
    2. Internal user error- not necessarily malicious but can-do extensive damage.
    3. Insiders- these are people who have malicious intent towards your cybersecurity and are looking to infiltrate the workforce inside the company.
    4. Organized Crime aka Cybercriminals- these are the bad guys out for money. They steal sensitive data and personal information to sell to corporations or keep for themselves to use or sell back to you. Most of the time this stuff shows up on the dark web/ black market e.x. social security numbers, etc.
    5. Government-Sponsored Actors- these threats are directly sponsored by government bodies to steal information (personal, intellectual, funds) of another country to further their own gain.

https://www.redlegg.com/blog/cyber-threat-actor-types

 

  1. Know yourself:Identify at least 5 digital processes, systems, and/or functions your company has in place. Importantly, address how could those be exploited or manipulated in order to gain access to valuable corporate or customer data?
    1. One thing my company has invested in is a good cloud backup system and management. Of course, hackers are always out there looking to break into things like the cloud, however with good management and a proper system in place disaster can be avoided.
    2. Collaborative technologies, such as the google suite, are imperative in organizing threat-free technologies. They have to be specifically shared with its receivers and editors to be accessed.
    3. The introduction into AI has been a key components to the ever-evolving technology world. Implementing AI or artificial intelligence into the everyday productivity of a company can be a game changer. Using things like fingerprint access, facial recognition software, and smart agents like Amazons Alexa or Apples Siri, technological help is everywhere and can be beneficial.
    4. Installing and using antivirus and antispyware software on company computers, as well as encrypting our websites for customer user security will be components added to prevent data from being exploited.
    5. Finally, having a secure Wi-Fi network that is protected not only by a password, but a firewall as well, can help keep things that need to be private, private. Having control over your password and making it available only to those who need it are important to keeping the bad guys out and changing it regularly helps keep the bad guys who are in, back out again.

www.capcoverage.com/index.php/10-ways-to-prevent-cyber-attacks/

  1. Develop your strategy: As the chief technology executive, make 5 recommendations that your company should adopt to be more safe, secure, and reliable. Again, consider hardware, software, networks, and human policies and procedures. (e.g., appropriate use policy on corporate computers; firewall; SSL/web encryption; backup/retention)
    1. Keep software up to date- by keeping software up to date there is no room for viruses to get in!
    2. Raise awareness companywide about phishing emails- this allows hackers to get into accounts by posing as a website that you may already have an account for, looking similar and then having you input passwords. NO, NO!
    3. Keeping good password management
    4. Treat your devices like you would your wallet- do not leave then unattended, they contain precious cargo!
    5. Keep personal data personal

www.synoptixsoftware.com/top-7-best-cyber-security-practices-to-keep-your-data-safe

Hi, there!

Hi! My name is Clair Fink. I’m originally from Zanesville but have relocated to Newark. I have previously attended university in Pittsburgh to play volleyball and taken CCP courses through Zane State in High School. This is my second and final year at COTC finishing the DMD program double majoring in web and graphic design. I have recently become a dog mom and am loving it! He is a 5-month-old cocker spaniel mini poodle mix, cockapoo. His name is Benny and I love him dearly. He is my header picture above! My family also has two labradoodles, two mini bulldogs and another cockapoo. I also have a pet fish named Beef. I am the oldest of four, but the second oldest of 9 as I come from a blended family. I enjoy riding my bike, swimming, trying new things, spending time with friends, family and pets, and crafting.