Module 6

In order to address the development of cyber-policy and cyber-infrastructure in spite of the “short arm” of predictive knowledge, I believe that business who experience frequent cyberattacks should have meetings about the best policies to prevent cyberattacks from happening. Companies should have cyber insurance to protect cyberattacks from happening or make it so that less…

Module 5

Today’s society almost everything is centered around computers or technology, its an integral part of our lives today that it is almost impossible to imagine a world without it. In my perspective I believe that technology has made the world a safer place. There are three reasons that I found on why that computers or…

Module 2 Activity

There are many ethical issues related to the collection, storage, and protection of data in databases. Companies collect and store a wealth of information about customers in their databases. An ethical issue that arises when storing electronic information about an individual is integrity and trust. Integrity can be an ethical issue because if a business…

Module 3 Free Write Activity

Create app that rates software Yacht GPS software is secure Become a Freelance Security Specialist Expertise in Penetration Testing Risk management skills Situational awareness skills Expertise in system auditing Contractual Cyberwork Updating the company disaster recovery plans Research upcoming trends in information technology & security Identifying the cause of security breaches Taking away cybersecurity risks…

Module 4

A cost of not developing cybersecurity programs for a business especially a small business, it can have a negative impact on the business. Not having a cybersecurity programs are more costly on small businesses because they can have a lack of knowledge or lack of resources about cybersecurity programs to prevent cyberattacks from happening. Another…

Module 3 Activity

As technology has opened a new space for cyberculture, new forms of deviance and social control have appeared. Some individuals use technology as a means of deviating from more traditional cultural norms. For example, in the United States, employees in offices are encouraged to remain productive and efficient, letting their minds wander off-task as little…

Freewrite Activity

In the fifteen minutes of minutes of researching the meaning of my name I found some intriguing information about the meaning behind it. Montell is pronounced as MAANTEHAHL. Montell is an English name of latin origin. Montell is a derivative of the English name Montel. Montell is rarely used as a baby name for boys….

Module 1 Assignment

Cybersecurity technology relates to my major because my major is Cybersecurity. The purpose of me taking Cybersecurity is that I wanted to understand how cybersecurity technology work. I was interested and wanted to make a career out of cybersecurity. I wanted to learn how the body of technologies, the processes and practices designed to protect…