ODU Logo

cyse200spring24

Amayia Baker

Author abake017

Entry #10

Engineers make cyber networks safer by first assessing the risk at hand. Risk assessments identify threats and vulnerabilities in the infrastructure. Once the risk are known they are ordered from most to least important. Second, based off the risk engineers… Continue Reading →

Entry #9

Computers have made the world safer and more efficient than ever. Communication is faster than ever before. Emergency response is quicker. GPS allows people to travel more efficiently and skip traffic. Surveillance cameras are also used in solving crime. This… Continue Reading →

Entry #8

There are multiple ways to tell if your computer is safe. One way is to make sure your computer is up to date. Regularly installing updates helps to keep your computer safe. Firewall protection adds in an extra layer of… Continue Reading →

Entry #7

The cost to develop a cybersecurity program within a business can be costly. You must have the financial funds to purchase the software and hardware for the infrastructure. After you have the funds you will need to hire someone to… Continue Reading →

Entry #6

Cyber technology has created opportunities for workplace deviance by creating a space for those who have knowledge of their systems to become insider threats. Insider threats come from within the organization. Employees know of the vulnerabilities in the infrastructure and… Continue Reading →

Entry #5

Cybersecurity freelancing Yacht telecommunications that is secure Being a penetration tester Ethical hacking for the government Recycle old cybersecurity hardware Startup for security hardware Engineering security software Cybersecurity consulting Universal firewall software Risk management service business Incident response services Train… Continue Reading →

Entry #4

Every country has its own set of rules and regulations when it comes to electronic data protection, but do they share the same risk? Let’s compare China and the Unites States cybersecurity risks. First, I want to consider the threats… Continue Reading →

Entry #3

Storing electronic data about individuals can cause ethical issues concerning privacy, consent, security, and data integrity. Every individual has a right to privacy. It is very important that only those authorized to have access to information have access and no… Continue Reading →

Entry #2

The four majors that come to mind relating to cybersecurity at Old Dominion University are electrical engineering, computer science, information technology, and criminal justice. Electrical engineering deals with the study of electricity and electronics. Cybersecurity is a part of all… Continue Reading →

Entry #1

Why are you interested in cybersecurity technology? I am interested in cybersecurity technology because since I was teenager I have been working with technology. It has always came natural to me. My first interactions with technology were with cellphones but… Continue Reading →

« Older posts

© 2025 cyse200spring24 — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑