One protection I would implement to ensure availability of the companies systems would be the protections against a DDOS attack. These attacks overwhelm a target server with a massive amount of traffic, usually from a bot net. The reason I would protect the companies systems is because if this attack is successful then all of…
Discussion 3: The IT Organization
The document describes the necessity of understanding AI tools as essential as a tool is to an engineer. AI provides an enormous library of functionality to the point where many workers will be able to use it in their jobs. This enormous library of functionality can also increase efficiency of those who use it since…
Components of a business in the modern era
David FlowersDepartment of video game development and design, Old Dominion UniversityCYSE-200: Cybersecurity, Technology & SocietyDr. Christopher BowmanFebruary 8, 2026 Other Component of an organization and where do they “fit” One component of a business should be information security. This component wouldmonitor how sensitive information is handled and what employees are able to access/know thebusinesses sensitive…
Discussion Week 2: Cybersecurity best practices are not just technical issues
Cybersecurity and privacy best practices are not just technical issues since privacy also relies on other people inside of the company to keep the sensitive information that they know quite. One example is that I had a friend in a Internship during a break from school, one of the heads from another department told one…
Week 1 Discussion: Introduce Yourself
Hello Everyone! My name is David Flowers and my major is in video game development and my minor is in film studies. I love to travel and visit other countries, so far I have been to Italy, Germany, and Japan. The thing that interest’s me most about cybersecurity is how remote servers are protected. I…