Prompt: How do engineers make cyber networks safer? As previously documented, cyber security is a multidisciplinary effort, requiring skills from numerous fields to achieve cyber safety goals and objectives. Engineering plays a crucial role in cyber security, especially in physical security. With the advent of new smart technologies, every aspect of society has been made…
Author: rtimm004
November 1st 2022 Entry 9#
Computers have made the world a safer place, from education to medicine, they have impacted all sects of society. Firstly, they have increased the efficiency of first responders and hospitals. Using computers, police can quickly pull up databases on potential suspects, giving them access to more information on potential criminals in a shorter time frame….
October 25th 2022 Journal Week 8th
Prompt: How can you tell if your computer is safe? Computer safety is of the utmost importance, because without it, livelihoods can be lost, reputations could be ruined, and identities stolen. There a few preventative ways to ensure that your computer is safe. Firstly, passwords used on the device and on the internet should be…
Journal 7th October 17th
Prompt: What are the costs and benefits of developing cybersecurity programs in business? There are numerous costs, as well as benefits, for developing cybersecurity programs in companies. Costs can be incurred in the initial stage of development, with employees being paid for planning and organizing resources. This stage may be costly, having to build policy and…
Journal #6 October 4th, 2022
PROMPT: How has cyber technology created opportunities for workplace deviance? Though there has always been mischief in the workplace, the dawn of the information age, the creation of modern computers, and advances in cyber technologies have provided more opportunities for workplace deviance. The definition of deviance is as follows, “the fact or state of departing…
September 27th 2022 Journal 5#
Prompt: Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Create new security policies for a local school.YouTube cyber security analyst, discover cyber threats on the platform. Building a stronger password policy for a law firmEncrypting data for a birthday clown federation. (I’m just trying to be funny,…
Journal 4# September 21st
Prompt: Compare cyber security risks in the U.S. and another country. Response: Cyber security practices, risks, and understanding differs across the globe. Some countries have relaxed policies regarding their data, whilst others take extreme, and sometimes overbearing measures to ensure no information leaks outside their borders. Nigeria is one of the more interesting countries to…
Journal 3# September 14th
Prompt: Describe four ethical issues that arise when storing electronic information about individuals. With the advent of the internet and the increase of online commerce, it has become a necessity that companies and institutions must store patron, staff, and user data. There are four main conundrums that arise with this data storage, however. The first…
Journal 2# September 8th, 2022
Prompt: Select four other majors offered by ODU and explain how those majors relate to cybersecurity. Answer: With Cyber Security, there are multiple ways to approach the field. Many have dubbed cyber security “interdisciplinary”, meaning that it involves more than one distinct discipline. There are four examples of majors at ODU that reinforce this interdisciplinary…
Journal 1# August 30th, 2022
Prompt: Why are you interested in cybersecurity technology? Answer: Personally, I’ve always had some level of interest in computer science. Before even getting into computer hardware, it impressed me how computer technicians were able to solve almost any computer issue with ease. As I got more and more into the field of computers, the most…