E-portfolio week 13

The internet and social media has become the vast highway for offending and victimizing people on very high scales that are so impossible to imagine. More attempts of suicide happen on the web than they do in real life. You have depressed people lose their lives due to cyber bullying and it is getting worse…

Portfolio week 14

It is said time and time again that society has become so dependent upon technology that it has become very difficult to imaging a world with no tech. Like think about it. 85 percent of people world wide are on their phone more than 8 hours of the day. Not only that but we use…

e-Portfolio 11

It is said that criminal justice and cyber crime are very much alike and different in various ways, but more often times than not , they are alike and share the same characteristics, cyber crime is dealing with identity theft, card theft, insurance fraud, hacking, treason piracy, cyberstalking, malware, security hacker, phishing, denial of service,…

Week 9 e-portfolio

One of the ways that you can tell if your computer or any device or not is to check and see if it had any security software that can keep hackers and viruses at bay. No matter how old you get and it does not matter how many devices you have, always make sure that…

portfolio week 10

One of the three ways that technology has made the world a better place is that people are able to live longer thanks to a computer  What human cannot do in an operating room computers can. Computers can have a steadier hand than a person therefore making the procedure safer. Another way that computers help…

e-portfolio 7

Data breaches and cyber attacks are known to cost a business millions of dollars depending on how big and or critical the data breach and cyber attack level is.  Depending on the amount of information and how top secret, classified, strictly unauthorized, and important it was when it was compromised. A specific business could spend…

E-portfolio 6

Workplace Deviance is a deliberate and malicious attempt to sabotage an organization, big businesses, and various small companies by causing problems and attacking them like it is an inside job. This is seen almost all the time in the field of work in cybersecurity. Workplace deviances can occur for multiple reasons. Naturally, it begins from…

e-Portfolio 5

Create security software You have to be wise Be your own unique person Enter areas of your own expertise Rent out small businesses Start your own business Enforce security Create firewalls Utilize your security Rat out hackers Invest in security for potential threats Team up against hackers Yacht gps software that is secure

ePortfolio 4

The United States of America is a major developed economy, and it is a country that is very dependent on the internet. Therefore, our country is at an extraordinarily high risk to a cyber-attack at any time. Speaking of cyber-attacks, the United States is one of if not the highest country in the world with…

Ethical issues

There are 4 major ethical priorities that arise when storing electronic information about individuals. The protection of private patient information. This is really important because that information is very confidential because it is like an invasion of privacy if they were to leak out somewhere on the internet. Their name, their address, phone number, ID,…