ePortfolio entry 13

When it comes to developing cyber policies and infrastructure with limited predictive knowledge, analysts must be strategic and adaptable to be able to react in any type of situation. There are a few ways that can help approach this scenario. Push continued education: Cyber threats are never the same and the world of technology is evolving more and more as...

Read More

ePortfolio entry #10

Engineers play a crucial role in making cyber networks safer by implementing various measures to protect against cyber threats and vulnerabilities. Engineers work on developing solid security prottocols and forms of encryption to safeguard data transmission and storage. They create secure communication channels and encryption methods that make it difficult for...

Read More

ePortfolio entry 9

Describe three ways that computers have made the world safer and less safe. Computers have ahad a very significant impact on the safety of our world. Some impacts for better and some for worse. First lets talk about 3 ways that computers have made the world safer. First off, computers have enhanced our way of communicating. Computers have revolutionized...

Read More

ePortfolio entry 8

How can you tell if your computer is safe? Computers require specific attention and care to keep them from becoming vulnerable. There are a few key things to look out for when trying to tell if a computer is safe for use. 1 would be to make sure you have the most up to date operating and software system. Ensureing that your OS, antivirus software, and other...

Read More

ePortfolio entry # 7

What are the costs and benefits of developing cybersecurity programs in business? Developing a cybersecuiryt program in abusiness is something that is very important when it comes to the security of the nusiness. It is something that will cost alot but is a necessity when it comes down to it. when it comes to building a strong cynersecurity program in a...

Read More

ePortfolio entry #6

How has cyber technology created opportunities for workplace deviance? Workplace deviance is described as the deliberate desire to cause harm to an organization or workplace. With the implementation of so many technological devices such as laptops and PCs it has been made much more easier for employees to cause harm to a organization once they feel that they...

Read More

ePortfolio #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  Create app that rates software.Yacht GPS software that is secureBecome an independant cyber threat analystEcommerce securityRent out a space to a cybersecurity companySecurity auditingEventually get entry level security position Create cyber training courses Understand...

Read More

ePortfolio entry #4

Compare cybersecurity risks in the U.S. and another country. When it comes to comparing cybersecurity risks between countries, the first country that comes in my mind is my native country, Pakistan. Now when I think of Pakistan and cybersecurity the first thought that comes to mind is that there is no way pakistan has a stronger cybersecurity infrastructure...

Read More

ePortfolio entry #3

Describe four ethical issues that arise when storing electronic information about individuals. Taking the necessary steps for maintaining privacy and confidentiality is the primary issue and challenges every organisation faces while storing the individual information electronically. The individuals information should be only shared with the other persons if...

Read More

Article Review #1

The principles of social science involve studying the human behavior and society to understand how people interact and make choices. It can be involved in fields such as sociology, psychology, anthropology, economics, and in its own way, cybersecurity. I say cybersecurity because often, especially when it comes to battling cybercrimes, analysts must monitor and...

Read More