ODU Logo

01212347

Student Name

Category Uncategorized

Engineers Impact on Cyber Networks

Engineers play an important role in enhancing the security of cyber networks through the implementation security measures and best practices. Their work is aimed at mitigating risks and protecting sensitive information from unauthorized access and malicious users. Engineers work on… Continue Reading →

The World of Computing: Safe or Unsafe?

Three ways the world has been made safer through computers are Protection from Cyberbullying, Cybersecurity and Data Protection, and Stronger Authentication. Cybersecurity measures, combined with policies, help fight cyberbullying, online harassment, and cyber stalking, promoting a safer digital environment for… Continue Reading →

The Development of Cyber Policy/Infrastructure and Corresponding Risks

The evolution of cyber policy and infrastructure has gone through incredible changes this century. Not only reshaping the way people live their day to day lives, but these advancements have also improved communication, and provided endless career options. It’s easy… Continue Reading →

On Cyber Technology and Workplace Deviance

Cyber technology has opened up many opportunities for workplace deviance, leading to misconduct and harmful actions within companies and organizations. Anyone can tell that cyber technology has revolutionized the way we work, communicate, and conduct business. Just look at the… Continue Reading →

Ethical Issues in Storing Electronic Information and a Comparison of Cybersecurity Risks in U.S. vs Ireland

Storing electronic information about individuals presents several important ethical concerns that should be taken into consideration such as privacy, data protection, and professional responsibility. Additionally, both the United States and Ireland face cybersecurity risks that impact the foundation of their… Continue Reading →

Malicious Code and other Cyber Threats

In the ever-expanding world of cyber threats, it is crucial for organizations to remain on the lookout for the various forms of malicious activities. These threats, identified by ISACA (The Information Systems Audit and Control Association), list the following categories:… Continue Reading →

Cybersecurity and Related Majors

My interest in Cybersecurity stems from my overall interest in security. As an analytical problem-solver, I’ve found I am someone who enjoys recognizing and resolving gaps. In my most recent role as a Support Engineer, I discovered my passion for… Continue Reading →

© 2025 01212347 — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑