Identify potential employment barriers.
Identification could include
- unethical activity (e.g., false reviews, cyberbullying)
- illegal activity (e.g., unauthorized hacking, criminal conviction)
- legal but socially undesirable activities (e.g., infidelity, substance abuse)
- socioeconomic situation
- geographic location
- cultural prejudices.
Process/Skill Questions:
- What is the CIA triad?
- What information do cyber criminals steal, and what do they do with the stolen information?
- What is cyberbullying?
- What are cyberbullying roles?
- What are the different kinds of hackers (e.g., white hat, black hat, grey hat)?
- When is hacking legal?
- What are examples of socioeconomic factors?
- Why is cybersecurity culture so important to organizational success?
- What regions continue to dominate the cybersecurity business?