1. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Cyber policies are critical as they cover most of the cyber coverage gaps that are out there. Cyberattacks are on the rise, and it becomes even more vital for companies to sit down and discuss what policies…
Journal #5
1. Describe three ways that computers have made the world safer and less safe. 2. How do engineers make cyber networks safer? Three ways that computers have made the world safer: Computers have had a total effect on the educational system; It has broadened the way users can access knowledge on the Internet. Users can…
Journal 4
1.What are the costs and benefits of developing cybersecurity programs in business? Expanding cybersecurity programs in businesses today is essential. “In 2014, Year-End Economic Reported the National Small Business Association, found that “half of all small organizations reported that they had been the victim of a cyber-attack from 44 percent in just two years” (The…
Freewriting Activity 2
Create an app that rates software. Yacht GPS software that is secure Become a cybersecurity engineer Execute security measures Research security breach incident Secure data in the organization Encrypt data for clients Cyber attacks that can happen make a plan Unauthorized users secure the network Reprogram better standards for cyberattacks Investigating cyber threats Train others…
Journal #3
How has cyber technology created opportunities for workplace deviance? Deviance is portrayed as “the reality or condition of withdrawing from common or acknowledged norms, particularly in friendly or adult conduct.” Workplace deviation can happen effectively in the digital innovation field since the aberrance could occur through the web, instead of eye to eye, which would…
Journal #2
Describe four ethical issues that arise when storing electronic information about individuals. PRIVACY AND CONFIDENTIALITY: Health care institutions, insurance companies, and others will require access to the data if ERs are designed. The key to preserving confidentiality is to allow only authorized individuals to have access to information. This begins with empowering users. The user’s…
Freewriting Activity 1
Take fifteen minutes and find out everything you can about yourself by Googling your name. What would others learn about you? Write a quick paragraph in your ePortfolio. My name is Nathaly; it comes of Latin origin, meaning “birthday.” Honestly, this is the first time finding my name on google; other times, when I research,…
Journal #1
How does your major relate to cybersecurity technology? Select four other majors offered by ODU and explain how those majors relate to cybersecurity. My major is Cybersecurity, I am currently a junior at Old Dominion University majoring in this exciting career of Cybersecurity. Cybersecurity’s a significant impact on our society to know and learn this…