I learned a lot bout how to manage a windows server this semester through using the Virtual Machine. Here is a screenshot of me in my CYSE 280 class Windows System Management and Security learning how to filter an event log through the server manager.
ePort #13
In the reading “The Online manifesto” Something that gets brought up is the dissolution of Modernity. Modernity is basically a way of thinking in today’s world or modern world. If we keep our minds in one specific time-period, we won’t progress as a society whether technology is involved or not. Progress in technology is something…
ePort #12
Cyber technology is now a main focus of communication. That wasn’t the case around twenty to thirty years ago. If privacy is a huge thing for people, then they should not make social media accounts. This is an easy way for people to learn who you are or what is about you. If you have…
ePortfolio #11
Criminal Justice involves every type of crime or illegal action. This includes cyber-crime and other technologies. Computers have been integrated into our lives very heavily over the past twenty to thirty years. With these advancements certain actions need to be taken to prevent criminals from doing illegal activities without any repercussions. With the Neutralization Theory…
ePotfolio #10
Systems like SCADA are used in many things associated with technologies involving infrastructure and many other things. Some examples are Water treatment, gas pipelines, and wind farms. These systems are created and managed by engineers who make them to try and combat cyber-attacks. The thing is if an attack were to happen on something that…
ePortfolio #9
Positives Security- Computers are an amazing piece of technology that are used for pretty much everything in modern day life. Whether it’s at a restaurant or playing games on a device or ordering tickets for a movie we all use computers to a certain extent. With computers we can keep surveillance on certain things a…
ePortfolio #8
Let’s start off by saying there is no way to know if your computer is exactly one-hundred percent safe. But you can do specific things to help minimize the risk of an intrusion. Things like malware are a big reason we have to keep our computers and other electronics under watch, so our information and…
ePortfolio #7
Cybersecurity in this day in age is a necessity for any company using the internet or technology. The main benefit for this is security itself. Passwords are not the most secure way of protecting things. Making sure employees of a company are well trained in being able to identify and try to get rid of…
ePortfolio #6
Having technology in a business can open tons of opportunities including expanding the business and make profits (Ezrati). Also finding a way to reach out to people all over the world with the internet. Although it is a great way to help businesses it can also cripple them with cyber threats (Ezrati). Cyber threats have only been…
ePortfolio #5
Create an anti-malware software to sell to companies Yard Surveillance system through the internet Bitcoin service protection Email spam detection for a company Remote access surveillance and protection Security from hackers and malware Electricity plant protection using cyber security Computer system protections Use ethical hacking to restore lost things from hackers Real life in person…