The Information Systems Audit and Control Association (ISACA) identifies the following types of malicious cyber-related activities: Pick one or several of these areas of cyber threats and discuss. Intellectual property threat can be a type of malicious attack in many… Continue Reading →
A framework is a structure you can build upon whether actual or conceptual. A framework is a starting point to assist in development to guide and make the process speed up to best reach the goals. It is also a… Continue Reading →
Review the article below by Orin Kerr, an important, scholarly voice in so many Fourth Amendment debates, and preferably other sources to help form your opinions about the legal, policy and technical challenges posed by encryption. The impact of encryption… Continue Reading →
There are many different ways a malware attack could be prevented. Such as filtering out packets you are not expecting just as if it were regular mail. By doing this you are not getting junk or putting the computer at… Continue Reading →
There are 3 main engineering focuses that work to protect cybersecurity functions. These jobstypically work together to bring the highest protection against cyber threats. The goals for all 3are aligned in completing the security triad of confidentiality, integrity, and availability.Achieving… Continue Reading →
Technology has changed throughout the years which has helped change many aspects of the way people live their daily lives. Examples of this can be shown through healthcare keeping charts on the computer along with vitals everyone can view. This… Continue Reading →
https://www.lawfareblog.com/lawfare-podcast-episode-96-james-comey-going-dark Then use what you’ve learned to: 1. Identify in your initial post a point(s) or general assertion(s) by former FBI Director Comey that surprised you, challenged you or led you to agree or disagree with him, and explain why…. Continue Reading →
If I could create my own business I would name it Book Genie. This website would collect the names of all books and upcoming releases. The purpose of the service would be to help others find accurate books based on… Continue Reading →
Question 1: What are some important reasons to a) support or b) oppose his Julian Assange’s position in defending the work and mission of Wikileaks? Question 2: In your opinion, is Assange a hero, a criminal or both, or neither?… Continue Reading →
The most noticeable difference between IPv4 and IPv6 is that IPv4 uses a 32-bit address and IPv6 uses a 128-bit address. While there may not be a speed-related difference IPv6 has more qualities such as a built-in network security layer…. Continue Reading →
PKI or Public Key Infrastructure is one of the most common forms of encryption and manages public key encryptions. PKI is used in the government, but not in business sectors due to the requirements to manage the certificates. Without proper… Continue Reading →
The best value to a company can vary. I believe each product or system has its own set of benefits. One system is popular to buy and therefore lost income would hurt the company as the time to fix or… Continue Reading →
© 2025 Jasmyn Wilhelm — Powered by WordPress
Theme by Anders Noren — Up ↑