Module 6

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? We should approach the development of cyber-policy and infrastructure with a sense of caution. It is a new realm for us and it should be taken with a grain of salt. Of course, it should be investigated thoroughly…

Module 5

Describe three ways that computers have made the world safer and less safe. Computers have streamlined and simplified many of our daily tasks, they also allow us to do many things that humans couldn’t accomplish before. With computers we can now program them to do difficult and undesired jobs such as assembly line workers. With…

Module 4

What are the costs and benefits of developing cybersecurity programs in business? Developing a proper cybersecurity program is vital if businesses, especially small ones, want to protect their data and customers from malicious attackers. To develop one businesses must decide where they want to focus their resources. When the business knows which data is too…

Module 3

How has cyber technology created opportunities for workplace deviance? Cyber technology has opened a whole new world for workplace deviance in the workforce. Now that people have their own mobile devices they can bring into work with them it ushers info all new issues. Bring your own device to work policies must be brought in…

Freewrite 2

Create a firewallYield a profitable softwareBecome a incident responderEncrypt sensitive dataRender a new methodSecure an unprotected siteEstablish a good understanding of pythonCreate a security plan Understand complex codesRecover functionality to a compromised siteInvent a new softwareTactically safeguard dataYearly assessments

Module 2

1. Describe four ethical issues that arise when storing electronic information about individuals. The main four ethical issues that arise when storing electronic information about individuals go as the following: privacy and confidentiality, security breaches, system implementation, and data inaccuracies. Privacy and confidentiality when handling information data about clients and their personal information must be secured…

Module 1

How does your major relate to cybersecurity technology? I am actually a cybersecurity major here at Old Dominion University. Cybersecurity technology is an essential part of my major and something that is required for me to learn about to complete my degree. Over the course of my ( hopefully ) four years at Old Dominion…

Freewrite

Not much shows up when you look up “Amanda Renee Tinsley” online due to my low profile presence online. However on a sad note what does pop up is my late mothers obituary. She had passed away in early 2019 and my father had her obituary published in the Richmond Times Dispatch. The obituary had…