How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? As time progresses, so does the need for new cyber policy and infrastructure. This can be a difficult task, however, due to the fact that technology is rapidly changing every day. The landscape of the IoT looks completely…
ePortfolio Entry 5
Describe three ways that computers have made the world safer and less safe. Since the introduction of computers, they have made our lives a lot easier than ever before. They have also made the world a bit safer. An example of this would be computer systems on boats and large ships. Computers are used to…
ePortfolio Entry 4
What are the costs and benefits of developing cybersecurity programs in business? Cybersecurity can be a difficult problem to tackle for a small business. This is especially true if the organization does not know where to start. An organization must first understand what information they have that needs protecting and what that information is worth…
ePortfolio Entry 3
How has cyber technology created opportunities for workplace deviance? The IoT is ever expanding, and new users are joining every day. People are becoming more addicted to social media and using their devices in general. With all of today’s technology, it is now easier than ever for employees to engage in workplace deviance. Not only…
ePortfolio Freewrite Activity
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity Create websitesYouTube cybersecurity tutorialsBreaching networks as a pentesterEncrypting sensative dataReinforcing security at a comapanyStopping cyber attacksEnforcing cyber lawsCreating and securing databasesUninstalling viruses and malwareResearching and catrgorizing new forms of malwareInvestigating log files of a systemTeaching Cybersecurity at a universityYouTube…
ePortfolio entry 2
Describe four ethical issues that arise when storing electronic information about individuals When it comes to storing data on users, there are four ethical dilemmas that arise. The first of which is the concept of privacy. Users and customers trust that their information is being collected and stored in a secure manner and that their…
ePortfolio entry 1
How does your major relate to cybersecurity technology?Select four other majors offered by ODU and explain how those majors relate to cybersecurity: I am a cybersecurity major here at Old Dominion University. That means cybersecurity technology directly relates to my major. Cybersecurity technology is one of the aspects of cybersecurity. I will be using the…
ePortfolio Freewrite Activity
Take fifteen minutes and find out everything you can about yourself by Googling your name. What would others learn about you? Write a quick paragraph in your ePortfolio: After Googling my full name, I was unable to find much information about myself. The information I did find were links to my social media like Facebook….