This is a complex topic as there are pros and cons that come with involving law enforcement with cybersecurity incidents. There are many reasons that companies do not decide to involve law enforcement in cybercrimes such as follows: Investigations will cause disruptions Some attacks come from abroad, which makes tracking the hacker is increasingly difficult They might feel like…
Category: CYSE 300 Discussion Boards
Discussion Boards of various topics between ODU students.
Attacks, Threats, & Vulnerabilities
First, a threat and an attack are very different yet similar. A threat is a statement of intentionally inflicting harm on someone or something. While an attack is intentionally inflicting harm on someone or something. Exploits are actions that are fully utilized when accessing and taking advantage of flaws or vulnerabilities in a computer/security system. I do…
IoT Challenges & Risks
In my opinion, one of the biggest security risks and challenges to Internet of Things (IoT) technology is the lack of encryption. Encryption is one of the easiest ways to prevent attacks and hacks from happening, and as stated in this article, “These devices lack the storage and processing capabilities that would be found on a…
Computer Security vs. Information Security
Computer Security and Information Security are similar concepts, but focus on different areas. Computer Security focuses on the protection of the hardware, software, and other important parts from various threats and possible damage. A general example would be protecting the system from things like viruses and malware with software programs like Norton and McAfee. Information Security focuses on protecting…