Skip to content

Edmund Reisser

Eportolio

Edmund Reisser

Eportolio

  • About Me
    • Resume
    • Contact
    • Skills –
  • Cybersecurity Foundations
    • CS 462
    • CYSE 280
    • CYSE 270 – Linux System for Cyber Security
    • PHIL 355E
      • Case Analysis 2
      • Case Analysis 5
    • IDS 493
  • Internship
    • CYSE 368
  • Blog
    • Home
    • 2022
    • April
Journal Entries

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

ereis004 April 26, 2022 0 Comments

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? The fact of the matter with cybersecurity is that it should be talked…

Journal Entries

How does cyber technology impact interactions between offenders and victims?

ereis004 April 26, 2022 0 Comments

How does cyber technology impact interactions between offenders and victims? With the popularity increasing for the internet usage, the connection and interaction between offenders and victims can become more and…

Journal Entries

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

ereis004 April 25, 2022 0 Comments

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? The line between criminal justice and cybercrime has…

Journal Entries

How do engineers make cyber networks safer?

ereis004 April 25, 2022 0 Comments

How do engineers make cyber networks safer? A Cyber Security Engineer creates computer security procedures and software systems, by doing this they are creating new and safer networks for companies…

Journal Entries

How can you tell if your computer is safe?

ereis004 April 22, 2022 0 Comments

How can you tell if your computer is safe? In the digital age, it is easy to believe that your computer may be secure from influences and hackers outside of…

Journal Entries

What are the costs and benefits of developing cybersecurity programs in business?

ereis004 April 22, 2022 0 Comments

Cybersecurity is arguably one of the most important aspects a business could invest in. The benefits definitely outweigh the costs in the long run, but sadly a lot of small…

Journal Entries

How has cyber technology created opportunities for workplace deviance?

ereis004 April 22, 2022 0 Comments

Deviance is defined as “the fact or state of departing from usual or accepted standards, especially in social or sexual behavior.” With the advancement of technology, deviance does not have…

Journal Entries

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.

ereis004 April 21, 2022 0 Comments

Create app that rates software.Yacht GPS software that is secureBiometric scannersEmbezzlement detectors for companiesRisk managementSoftware engineering toolsEncrypting data from websitesCyber Training Uninstalling malware viruses from computersRestoring corrupted dataInvestigating instances of cybercrimeTracking any suspicious…

Journal Entries

Compare cybersecurity risks in the U.S. and another country.

ereis004 April 21, 2022 0 Comments

Cybersecurity is the protecting of computers, servers, networks, mobile devices, and the data stored in these devices from criminals looking to use this data for their own personal gain. With…

You Missed

Journal Entries

Career Paper

Journal Entries

Module 11 Bug Bounty

Journal Entries

Module 11 Case Study

Journal Entries

Module 10 Article Journal

Edmund Reisser

Eportolio

Copyright © All rights reserved | Blogus by Themeansar.

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept