jharl004

Just another Old Dominion University - Wordpress site

Category Uncategorized

Entry #13

“How should markets, businesses, groups, and individuals be regulated or limited differently in the face of diminishing state power and the increasing intelligence and networking of the material world?” Due to the nature of a capitalistic economy, the market should… Continue Reading →

Entry #12

I have been asked to answer a question regarding cyber policy. The question reads, “How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?” My answer is quite simple, we should continue to… Continue Reading →

Entry #11

                The interaction between offenders and victims of cyber technology is that the technology provides a medium for repeat offenses. Restricting the access to this is actually quite impossible. However, increasing the awareness of these crimes and increasing the repercussions… Continue Reading →

Entry #10

Due to the increase in cybercrime in today’s world, cybersecurity actually overlaps with the criminal justice as a consequence. For example, if a company has a data breach that results in thousands of individual’s personal data being compromised, then that… Continue Reading →

Entry #9

                Cybersecurity networks provide the “front-line” defense against many attacks. It is important for cybersecurity personnel to bolster their defenses of their IT infrastructure. Network engineers are an integral part of this process and provide many ways to carry out… Continue Reading →

Entry #7

                Cybersecurity has grown quite a lot over the passed few years and consequently, businesses have integrated it into their normal budget. Doing this has had great beneficial ramifications. However, it hasn’t been done without costs. Some of the benefits… Continue Reading →

Entry #6

                The realm of cybersecurity has changed the way employees behave in the workplace. While it has been mostly good, there are some bad things that have followed. Expanding on that notion, it seems that there have been an increasing… Continue Reading →

Entry #5

Create strategies to better protect information. Yield security services to companies. Become an application developer. Erase or wipe old storage devices.   Reduce the risks associated with an online business presence. Securely deploy a server. Enlighten those who do not… Continue Reading →

Entry #4

In my fourth entry, I will be discussing the differences in cyber security risks in infrastructure, specifically the electric grid, between the United states and Canada. In 2015, Canada produced 59 percent of its entire electricity output via hydroelectric energy;… Continue Reading →

Entry #3

I am now required to discuss four ethical issues that stem from storing personal information electronically. This required a lot of thought throughout this process of writing. To begin, the first issue that comes to mind is how the data… Continue Reading →

« Older posts

© 2025 jharl004 — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑