How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? As most people know, the need to be prepared for what is to come is important in all aspects of life. Using predictive knowledge in any situation could prove to be useful to some degree but you also…
Eportfolio Entry #5
1. Describe three ways that computers have made the world safer and less safe. 2. How do engineers make cyber networks safer? 1. Computers and technology in general both have a long list of both pros and cons. However, it is important to realize that whether or not it be safe or unsafe much of…
Eportfolio Entry #4
1. What are the costs and benefits of developing cybersecurity programs in business? 2. How can you tell if your computer is safe? When looking at businesses there are a lot of factors that one has to consider dealing with. Both cybersecurity and information security have the potential to affect businesses in lage ways. Information…
Eportfolio Freewriting Activity
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Create firewall for companies You can offer your services to companies Block anyone who is trying to attack systems in any way Engineering software Run tests on companies security Selling your services out to companies Expand your skill set…
Eportfolio Entry #3
How has cyber technology created opportunities for workplace deviance? Deviance in the workplace is defined as the intent to disrupt the organization of the workplace by committing any acts that can be deemed malicious. This can include things such as bullying, sexual harassment, or hostility towards the workplace in general. Cyber technology has been instrumental…
Eportfolio Entry # 2
1. Describe four ethical issues that arise when storing electronic information about individuals. 2. Compare cybersecurity risks in the U.S. and another country. Data privacy is an area that focuses on the data collected on individuals and how it is used by companies. Storing information about individuals electronically, usually happens in situations where data is…
Eportfolio Freewriting Activity
Take fifteen minutes and find out everything you can about yourself by Googling your name. What would others learn about you? Write a quick paragraph in your Eportfolio. After spending some time googling myself I am actually surprised that there is not more information about myself. If someone else was googling me they would find…
Eportfolio Entry #1
How does your major relate to cybersecurity technology? Select four other majors offered by ODU and explain how those majors relate to cybersecurity. Many people see cybersecurity as a term that describes measures taken to protect against the use of electronic data or trying to do so in a either criminal or unsactioned manner. However,…