Identify potential employment barriers.

Identification could include

  • unethical activity (e.g., false reviews, cyberbullying)
  • illegal activity (e.g., unauthorized hacking, criminal conviction)
  • legal but socially undesirable activities (e.g., infidelity, substance abuse)
  • socioeconomic situation
  • geographic location
  • cultural prejudices. 

Process/Skill Questions: 

  • What is the CIA triad?
  • What information do cyber criminals steal, and what do they do with the stolen information?
  • What is cyberbullying?
  • What are cyberbullying roles?
  • What are the different kinds of hackers (e.g., white hat, black hat, grey hat)?
  • When is hacking legal?
  • What are examples of socioeconomic factors?
  • Why is cybersecurity culture so important to organizational success?
  • What regions continue to dominate the cybersecurity business?