Going into this class, I was surprised to find out how writing intensive this class was with the material I looked at. Honestly, I hated writing many papers, but I realized I wouldn’t have gained knowledge about these philosophical topics prior if I hadn’t written documents about them. Every topic taught me something about the…
The Predictive Arm of Short Knowledge | Discussion Board
The most important insight I gained from this reading is that staying informed about daily updates in the cyber world is essential for developing predictive knowledge. In a rapidly evolving digital landscape, being one step ahead requires an in-depth understanding of the latest developments in cyberspace. By keeping pace with emerging trends, new technologies, and…
Opportunities for Workplace Deviancy | Discussion Board
The anonymity that cyber technology provides for workplace deviance is evident. The ability to take longer breaks because an individual is focused on their phone can distract them from their job. Cyber technology can also be used to spread harmful messages or confidential information to other coworkers. This type of situation reminds me of a…
The Human Factor In Cybersecurity
Preface Because of the limited budget that I have, for training I would like to use a 50% percent approach, cybersecurity would have to be 35%, and any research of new technologies would make up the rest of the budget. This allocation into three of these major fields will be beneficial in prioritizing training and…
AI Comparison Blog
Analysis of Cybersecurity Program Placement: Political Science, Information Technology, Psychology, and Reporting Directly to the CEOEstablishing a cybersecurity program within a new university requires strategic consideration regarding its academic placement. The department’s location within the organization can significantly influence its curriculum, focus, and the type of students it attracts. Below is a comprehensive analysis of…
CIA TRIAD
CIA Triad: ExplanationJaylen Hill 9/15/2024 PrefaceAlthough authorization and authentication is similar they still have key differences that set them apart from each other. The main difference between the two is how they handle information to the user and the access to the information. Authentication is verifying a user’s log-in information with dual authentication. While authorization…