Week 6

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? How does cyber technology impact interactions between offenders and victims? Policy and Infrastructure Cyber-policy and -infrastructure should be approached with an eye toward the future. We need to make decisions now that protect people in our time, but…

Week 5

Describe three ways that computers have made the world safer and less safe. How do engineers make cyber networks safer? Safer vs. Less safe Computers have made the world safer by Enabling near-instant computation of complex mathematical models to ensure airplanes, trains, automobiles, etc are moving safely through the world Communication, aided by computers, has…

Week 4

What are the costs and benefits of developing cybersecurity programs in business? How can you tell if your computer is safe? Cost vs. benefit: Developing cybersecurity programs Each business must decide for itself what it desires from a cybersecurity program in terms of cost and benefit. A large business with billions of customers, like Amazon,…

Week 4

Prompt: How has cyber technology created opportunities for workplace deviance? As we studied in the readings pertaining to cyber harassment and cyber stalking, the two biggest challenges in addressing “deviant” behavior are anonymity and accessibility. By “anonymity,” I mean that deviant behavior can be carried out by anyone with access to the internet, without necessarily…

Free Write – Acrostic

This week, we have to use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Create plugins for IDEs that alert developers to insecure programming practices YouTube – monetize videos about good cybersecurity practices Be a billable resource for cybersecurity for small businesses Educate – give tutoring lessons for…

Week 3 & 4

Two topics this week: Describe four ethical issues that arise when storing electronic information about individuals. Compare cybersecurity risks in the U.S. and another country. Ethical issues Some googling on this prompt turned up an article that I think perfectly encapsulates the ethical issues pertaining to electronic storage of information about individuals. In Four Ethical…

Freewrite: Self-Googling

This week, we were tasked to spend 15 minutes finding out everything we can about ourselves by googling our own names. I didn’t need the entire 15 minutes, turns out. I’m one of those strange people who goes by a name that’s not printed on official documents like licenses or contracts. My “government name” is…

ePortfolio assignment one

This week, we’re tasked with writing responses to the following questions: How does [my] major relate to cybersecurity technology? Select four other majors offered by ODU and explain how those majors relate to cybersecurity. Before I answer these questions, I think it is important to establish a baseline definition of cybersecurity. For this definition, I…