e-portfolio #7

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Cyber policy is the overall approach of making sure people are safe from threats on the internet like cybercriminals. In today’s society, everyone puts their trust in technology to store, collect, and manage their private information. Many people…

e-portfolio #6

1. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?  Cyber policy is the overall approach of making sure people are safe from threats on the internet like cybercriminals. In today’s society, everyone puts their trust in technology to store, collect, and manage their private information. Many…

e-portfolio #5

1. Describe three ways that computers have made the world safer and less safe. One way computers have made the world safe is the easy access of information. Easily accessibility of information has saved countless lives when people are in the hospital. All they had to do was just to look up a file in…

e-portfolio entry #4

What are the costs and benefits of developing cybersecurity programs in business? The cost of each attack on business could range from hundreds to thousands. According to  “The Impact of Cyber Security on Small Businesses” article, the average cost of each attack has gone up to $20,752. This could be detrimental to any business, and…

e-portfolio entry #3

How has cyber technology created opportunities for workplace deviance? Cyber technology has created workplace deviance because people may feel that it’s an easy way to steal. People understand that almost every piece of information is stored online somewhere and if someone can get their hands on a valuable piece of information they would make a…

e-portfolio entry #2

1. Describe four ethical issues that arise when storing electronic information about individuals. A lot of ethical issues could arise when storing electronic information about individuals. One ethical issue is the inappropriate use of sensitive data. This is one of the worst things that can happen to a person online. A person could lose or another…

e-portfolio entry #1

How does your major relate to cybersecurity technology? Select four other majors offered by ODU and explain how those majors relate to cybersecurity. My major is cybersecurity and it self explanatory of how it relates to cybersecurity technology. Because the whole point of cybersecurity is to protect the security of data on the internet. The…