1. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Society has become so dependent on technology; it is hard to live in a world without it. So much of the things that go on day to day rely on technology from the way schools teach to making…
module 1 free write
When you look up my name the only thing that comes up that pertains to me is my Facebook. There you will find the things that I like and the friends that I have. It is hard to look up things about me because there are so many people with the same last name and…
module 5
Describe three ways that computers have made the world safer and less safe. Before the advent of technology, most people had to gather information from books and save documents and data on paper and in folders. This is tedious because it meant that things would pile up, and people would be looking in books for…
module 4
1. What are the costs and benefits of developing cybersecurity programs in business? In the world that we live in, it is essential to have a good cybersecurity program in a business. This is because more and more information is being stored on the web. There are always costs and benefits with programs, so the company…
module 3
How has cyber technology created opportunities for workplace deviance? Cyber technology in the workplace has created deviance because more people have easy access to it. This level of accessibility has allowed more employes to access data. Because of this, more data can be shared and sent to the wrong people. For example, before cyber tech,…
module 3 free write
Code better ways of protecting dataYacht GPS software that is secureBuild security systemsEncrypting dataRate security systemsSoftware development Ethical hackingCreate apps that help with securityUnderstanding how new hacks can be stoppedReinforce existing security systemsInspects the protectiveness of security systemsTeach how to protect online dataYoutube info videos
Module 2
1. Describe four ethical issues that arise when storing electronic information about individuals. All over the world individuals, data is stored all the time. This data includes bank info, credit card information, and much more. The issue becomes when the data is stored online. Many risks come with so storing data online, and they are things…
module 1
How does your major relate to cybersecurity technology? Select four other majors offered by ODU and explain how those majors relate to cybersecurity. My major is cybersecurity and relates directly to cybersecurity technology. Much of the things that I will learn in cybersecurity can be translated to cybersecurity technology and vis versa. Many majors can…