This author views technology as evil. He believes technology is a threat that we are associating ourselves with. It was believed at one point that technology was a goal or striving point for progress, but now we are hidden behind technology. Jonas… Continue Reading →
Technology in a sense has become a crutch. Many people believe and appear to be more confident behind a screen. Bullying in school is still very sadly common, but that then translates online. Social media has made it so that… Continue Reading →
Cybercrimes and the criminal justice system do encounter each other. Many believe that due to cybercrimes being committed on the internet or through a computer, it is not punishable in court or do not apply to a court system. This… Continue Reading →
SCADA stands for Supervisory Control and Data Acquisition, and it is used to control, monitor, and record events of systems. This system is very useful, especially for many industrial organizations. It allows people to access the logs and records recorded… Continue Reading →
Since the popularity of cybersecurity has increased so has the threat to many engineering technology systems. Not only can this apply to surveillance systems, operating systems, or banking. Cyber attacks can affect factories for example. One incident of this is… Continue Reading →
The reason for cryptography is to securely send messages and to make sure the message sent is what the receiver is getting using math and technology combined. It can involve encrypting plaintext into ciphertext and sending it and then the… Continue Reading →
Part 1: Based on the reading alone by IBM millennials ages 20-36 seem to have less concern for password safety than those 55 years and up. Many millennials prefer convenience over security based on the survey given. It seems the… Continue Reading →
To start off figuring out how to spend the money in a business, I believe best practice would examine all of the protections needed based on inventory. Certain protections do not need to be purchased if that type of product… Continue Reading →
Provide your understanding of this report on Industrial Cybersecurity. Also, what are the impacts of a security breach on a company? Are organizations prepared for this type of threat? According to the article from my perspective, companies overall underestimate the damage or… Continue Reading →
The Information Systems Audit and Control Association (ISACA) identifies the following types of malicious cyber-related activities: Pick one or several of these areas of cyber threats and discuss. Intellectual property threat can be a type of malicious attack in many… Continue Reading →
A framework is a structure you can build upon whether actual or conceptual. A framework is a starting point to assist in development to guide and make the process speed up to best reach the goals. It is also a… Continue Reading →
© 2025 Jasmyn Wilhelm — Powered by WordPress
Theme by Anders Noren — Up ↑