Module 6

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? While its difficult, if not impossible, to know what the future holds from a cyber security standpoint. There are still ways we can about trying to future proof a cyber security program to the best of our current…

Module 5

Describe three ways that computers have made the world safer and less safe. The Internet-of-Things Pros: Everything now seems to be connected to the internet, Be it your refrigerator that monitors and records what kind of food you consume and automatically generates a shopping list when it notices that you are running dangerously low on…

Module 4

What are the costs and benefits of developing cybersecurity programs in business? Every day we expose ourselves to potential risk, be it crossing a street, or driving a vehicle. We are taught from an early age to try and mitigate risk wherever we can, that can be done by looking both ways before crossing and…

Module 3

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  Consultant for an organizationYour level of knowledge in the field can translate to a higher salaryBug bountiesEncryption techniquesRisk management and mitigationSecurity specialistEntry level salary compared to other professionsCertifications you can earn to increase your annual salary Understanding architecture and…

Module 2

Describe four ethical issues that arise when storing electronic information about individuals. Digital Clinical Records: As technology has improved, more and more companies and organizations are transitioning to digital record keeping. A major advocate of this is the medical sector, and this comes with its own set of issues. Technological competence is critical in this…

Module 1

How does your major relate to cybersecurity technology? My major is currently cybersecurity, however, since cybersecurity covers a wide variety of fields and specialties, I haven’t decided what it is I want to specialize in within the field. Select four other majors offered by ODU and explain how those majors relate to cybersecurity. Cyber Crime:…