The “Short Arm” of predictive knowledge refers to the known repercussions, consequences, and ethical idealism behind incidents and situations, ultimately within a short duration of time. The timing of events that happen in real time is often difficult to predict if not impossible, as an result this would make the odds of preparing a full…
Author: rjack008
Entry #6
The “Short Arm” of predictive knowledge refers to the known repercussions, consequences, and ethical idealism behind incidents and situations, ultimately within a short duration of time. The timing of events that happen in real time is often difficult to predict if not impossible, as an result this would make the odds of preparing a full…
Are Computers Making The World Safer?
Computers have certainly improved the world around us to an unbelievable extent, and ultimately they have enabled humans to be able to acquire information that could never be obtained otherwise; Astronomy, media related news at every level (local, national, and international). Despite all of this however, One question that is becoming more and more debatable…
Entry #4
The first step to equipping a business with a cyber security program is to first recognize that you have a need for one, as most businesses do. The main reason why all businesses need some variation of a cyber security program is because all businesses have the need to store information: tax information, employees information, customer…
Entry #3: How has cyber technology created opportunities for workplace deviance?
Deviance is best defined as the defiance of regulations and customs. Having said this deviance in a work environment could most accurately be interpreted as the refusal to abide by rules and protocols set by those in charge of the workplace. Cybersecurity has enlarged the scope of such turmoil especially since access to the cyber…
FreeWrite activity #2
Create training coursesYoutubeBuild an appEncrypt dataResearch new defensive tacticsStocks for cybersecurity companiesExplore vulnerabilities of different networks and softwareCreate security guidelines for organizationsUncover hackersRevise protocolsInvestigate cybercrimeTest networks of various organizations Youth teaching
Entry #2:
Over recent decades computers and networks that incorporate them have improved drastically to this point. In addition to new feats of technology, the overall use of technology has also grown substantially to this point. It seems as if literally everyone has a new smart phone or smart mobile device, young, middle aged, or elderly. While…
About Me (Freewrite activity):
If you look up Raekwon Jackson (my name), you likely won’t see anything at first without scrolling. However, if you scroll down enough or simply add the word Hudl behind my name, you can find me. The first thing you’ll notice is that I’m in a football uniform which, needless to say, would indicate that…
ENTRY #1
I am Raekwon Jackson, and I am majoring in Cybersecurity. Cybersecurity is an extremely broad field that will continue to expand and grow as society dependency on technology continues to increase. Most jobs of today involve technology whether it be just a register, or a personal computer. One thing is certain for our technological future,…