ePortfolio #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? The good or bad of an action is wholly decided within a short-term context and its moral quality shines forth visible for witnesses… Continue Reading →

ePortfolio #12

How does cyber technology impact interactions between offenders and victims? Recent research of cyber technology demonstrates a significant rise in rates of crime that use information technology systems over the last two decades, whereas the rate of traditional crimes have… Continue Reading →

ePortfolio #11

Cybersecurity is an interdisciplinary pursuit intertwined in STEM disciplines as well as the social sciences. The advent of the computer has changed the way individuals behave and much of what we do now is connected to technology. Similariliy, crime has… Continue Reading →

ePortfolio #10

The need for trustworthy secure systems stems from a wide variety of needs driven by missions, business, governments, and a spectrum of other objectives. Today’s systems have dimensions and complexity that require disciplined and a structured engineering approach to achieve… Continue Reading →

ePortfolio #9

Today, the world has been taken over by technology in every aspect. They have begun to make the world a safer place and has advanced us to a place of comfort. There are many advantages of computers and the ways… Continue Reading →

ePortfolio #8

Cryptography is the art, science, practice, and study of securing communications to make sure your computer stays safe. In its essence, cryptography is used to keep your messages and data safe from those lurking or actively trying to steal it…. Continue Reading →

ePortfolio #7

What are the costs and benefits of developing cybersecurity programs in business? With an increase in cyber attacks and data breaches across the web, it is costing millions of dollars for companies depending on the severity of the attack. Highly… Continue Reading →

ePortfolio #6

How has cyber technology created opportunities for workplace deviance? Through new technologies created by cyber programs and companies, it has started many opportunities for people in the workplace to indulge in deviant behavior. Whether it deals with harming hardware or… Continue Reading →

ePortfolio #5

cryptographyYacht GPS software that is secureBug bountiesEarn certificationsRun bot netsSell goods and servicesEarn contracts at companiesConsultant workUse the skills you’ve learned and sell them to companiesRent property to a cyber security companyInvest in cyber companies/machinesTeach employees about cyber safety(prevent IDOT errors)You… Continue Reading →

ePortfolio #4

Compare cybersecurity risks in the U.S. and another country. China has the world’s largest market in mobile payments, digital shopping, and internet financial services. An approximate 400 million people in China use mobile devices to make most of their payments…. Continue Reading →

« Older posts

© 2025 CYSE 200 – Kirstyn Pope — Powered by WordPress

Theme by Anders NorenUp ↑