Cybersecurity Risks In the U.S. and Another Country.

ENTRY-4 It essential to understand, when we are talking about cybersecurity risks, we are referring to risks that are different than corresponding area of topics for example, the traditional military wars. Unlike others, Cybersecurity risk-challenges are borderless and they extend beyond specific domain of physical and logical space. Generally, geographical location is not a factor…

Four Ethical Issues That Arise When Storing Electronic Information About Individuals

ENTRY -3:       There was no-time like now; information has been so valuable and powerful that decisions making from basic hiring practices to huge policy formations are dependent in the availability of stored data about individuals. Because this available data are becoming continuously influential in the daily lives of individuals, for example in determining insurance…

Four Majors Related to Cybersecurity

ENTRY-2         As many of us agree, Cybersecurity can be considered relatively a new evolving major. It doesn’t have a common, conventional, independently-standing definition for everyone to agree-on. The nature of its technical-complexity in addition to the fact that it dissects and touches multiple social and technical disciplines classifies this major as interdisciplinary field of…

Reason For Interest In Cybersecurity

ENTRY-1         Generally speaking Cyber security is certainly, one of the most timely-demanding fields of study in this technological advanced period of time. Personally, my interest in cyber security has evolved over a period of time for different reasons. My initial understanding of technology, a realization that it’s inseparable from our real life, in-fact in…