Geeksquad Reflection 1: Geeksquad Reflection 2: Geeksquad Reflection 3: Geeksquad Final:
Opportunities for Workplace Deviance Cyber technology has expanded opportunities for workplace deviance by giving resources and environments that can be misused. Cyber technology provides employees with easy access to sensitive information and digital tools. This lowers the barriers for engaging… Continue Reading →
Ethical considerations of CRISPR Gene editing In the Bio Cybersecurity section of the course many ethical considerations were identified that raised concerns for human safety. CRISPR technology has made a tremendous impact on medicine and agriculture. Yet this could be… Continue Reading →
NIST Cybersecurity Framework In this module we learned about the NIST Cybersecurity Framework for workplace readiness. The framework analyzes the countless benefits to organizations and or businesses to help improve their cybersecurity management and combat exploitation. Businesses can gain many… Continue Reading →
In the TEDx talk Davin teo provides insight into the field of digital forensics and its importance in combating cybercrimes. His education in computer engineering equipped him with technical skills necessary for digital investigations, but he was curious about human… Continue Reading →
Everyone uses the internet for everyday use especially when people work and students. There are a plethora of things to search that many people do not know are illegal. The first serious offense in my opinion is faking your identity… Continue Reading →
The program bug bounty is a penetration testing unit in which cybersecurity specialists use their knowledge to pinpoint and explain vulnerabilities in a company’s network. Companies are looking into paying for a better security network for their business, researchers analyzed… Continue Reading →
The letter outlines the data breach amongst Glass Washer Parts website, they experienced a cyber attack within their third-party’s network system. The attacker was able to gain consumers names, phone numbers, address, and card information from the data leak, which… Continue Reading →
A cybersecurity analyst job relates to social behaviors in many different ways. Cyber Security analyst jobs intersect with social behaviors in many ways highlighting the importance of understanding human psychology and sociology. Many cybersecurity analysts jobs require candidates to have… Continue Reading →
The article, “Social cybersecurity an Emerging National Security Requirement” by Lt. col. David M. Beskow and Kathleen M. Carley, discusses the emergence of social cybersecurity in the importance of national security in modern warfare of America. A Russian tactic used… Continue Reading →
© 2026 ePortfolio — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑