Module 6

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? I believe the best way to develop cyber-policy and infrastructure given the short arm of predictive knowledge is to try and understand how these cybercriminals think and operate. If we can pick up on patterns or other human…

Module 5

Describe three ways that computers have made the world safer and less safe. When computers were first invented people thought it would be just another fad like rollerblading, but computers are apart of our daily lives. Computers have become so vital to modernization, but they are also responsible for so many problems. Computers are capable…

Module 4

What are the costs and benefits of developing cybersecurity programs in business? Developing a good cybersecurity system for your business can be confusing, time consuming, and expensive; but it is also one of the most important aspects of having a successful business. Not having any cybersecurity measures in place can, and most likely will, put…

Module 3

In this age of technology more and more of our private information is stored online. From credit cards, to passwords, to social security numbers, we have more vital information stored online than ever before, but we are also more protected than ever before. There is a chance your personal information can be stolen at almost…

Freewrite Activity #2

Cryptography lessons You can do pen-testing for companies Bug bounty hunting Expand your client base Rent out property to a cybersecurity company Sell secure software Earn more certs to open more opportunities Create a cybersecurity website Use programing skills to write script Reach out to higher level people in cybersecurity and learn as much as…

Module 2

Describe four ethical issues that arise when storing electronic information about individuals. Individuals trust companies and organizations to protect their personal information. One ethical issue that can arise when storing electronic information about individuals is privacy and confidentiality. If a company gets hacked into and their customers personal information is leaked, that trust is broken…

Freewrite Activity

As I went down the google rabbit hole I was only able to find one shred of my existence. I was expecting to find a picture of me playing soccer or maybe an art piece, but I only found one single picture. The one picture I found came from my instagram and it is me…

Module 1

How does your major relate to cybersecurity technology? My major is cybersecurity. When I was first deciding my major I really didn’t know what I was interested in until my friend introduced me to cybersecurity. He tried to explain what cybersecurity was and it was really interesting. I have always loved technology and have been…