Krystal Marsh
  • Hello!
  • Experience
    • Skills
    • Awards and Recognitions
    • Internship
      • CYSE 368
  • My Coursework
    • Cybersecurity Foundations
      • CYSE 300
      • CYSE 301
      • ECE 416
      • ECE 419
    • Tech & Society
      • IT/CYSE 200T
    • Law & Ethics
      • CRJS 405
      • CYSE 406
      • PHIL 355E
    • Cybersecurity Applications
      • CYSE 407
      • CYSE 494
  • Journal
    • Political Philosophy
    • Looking at Infrastructure Development
    • Cybervictimization
    • Cybercrime and Criminal Justice
    • Cybersecurity and Technology in the Workplace
    • Ways to Make Money in Cybersecurity
    • Outsourcing and Security
    • Cybersecurity in Business
    • My Major – Cybersecurity
    • Google Me
  • Contact

Looking at Infrastructure...

Critical infrastructure protections are very important and individuals affiliated with an organization should have at least a basic understanding of what the appropriate standards and protocols are in order to aid in maintaining security. It is said that people are the weakest link so awareness, training and communication are very important. Next, systems should always be well maintained and up to date with...

Sign Up Today
Looking at Infrastructure Development

Political Philosophy

How should markets, businesses, groups, and individuals be regulated or limited differently in the face of diminishing state power and the intelligification (Verbeek, p217) and networking of the material world?             The current position on cybersecurity seems to be that everyone from everyday citizens to businesses and government agencies should remain on constant...

Sign Up Today
Political Philosophy

Cybervictimization

In many ways, cyber technology has made some crimes or aspects of crime easier to commit than they would have been a number of years ago. Cyber criminals have much more access to personal data and sensitive information that gives them what they need to carry out their activities or the means to access even more than what a person might normally give access to in a typical physical, public setting. For instance, a person...

Sign Up Today
Cybervictimization
Prev Next Looking at... Critical infrastructure protections are... Political ... How should markets, businesses, groups, and... Cybervicti... In many ways, cyber technology has made...

Powered by WordPress | Designed by Elegant Themes

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept