Course Reflection Public Speaking COMM101

Using the e-portfolio has improved my professional presence in that I have a greater understanding of organizing my coursework in all of my courses. The main aspect I enjoy the most about an e-portfolio is the organization of my work and creating separate pages for my courses. The most challenging part of the e-portfolio has…

Designing the Public Sphere: Information Technologies and the Politics of Mediation

How should markets, businesses, groups, and individuals be regulated or limited differently in the face of diminishing state power and the intelligification (Verbeek, p217) and networking of the material world? State power is weakening, and the environment is becoming more interconnected and intelligent. Regulation must move towards governance that shares responsibility in our economy, technology,…

The Short Arm of Predictive Knowledge CYSE200T

In reference to Jonas’s “short arm of predictive knowledge,” we are not necessarily thinking of the long-term effects of cyber technology yet. Most of our information is based on reactions to threats and the development of new technology. Jonas argues that we have to change how our policies are to become more innovative and look…

Balancing Tradeoff of Training and Cybersecurity Technology

In my professional opinion we should allocate 70% of the remaining $1,000,000 to employee training because even the best cybersecurity technology can’t prevent human mistakes. Most breaches begin because our employees are unaware of certain dangers and unknowingly expose our systems to attacks. By investing in training, our organization is strengthening the first line of…

SCADA Systems

What is the SCADA system? It is an industrial control system used to monitor and manage infrastructure and processes in real time. In this write-up it will discuss what SCADA systems are essential for. Additionally, it will discuss SCADA system vulnerability associated with critical infrastructure systems, as well as the role SCADA applications play in…

Reflection Blog Post

The goals for the e-portfolio can be summarized by highlighting my skills and accomplishments throughout the course of my time at Old Dominion University. It allows me to see the growth in my professional development and can influence future employers based on how well-done it’s put together. The easiest part of setting up my e-portfolio…

The CIA Triad and The Difference of Authentication and Authorization

Within this paper there will be a description of the CIA Triad and the difference between authentication and authorization. The CIA triad is considered a model designed for guiding information on security policies. Its acronym stands for confidentiality, integrity, and availability which will be further discussed. What is the CIA Triad? The CIA triad is…