ePortfolio entry 9
Describe three ways that computers have made the world safer and less safe. Computers have ahad a very significant impact on the safety of our world. Some impacts for better and some for worse. First lets talk about 3 ways that computers have made the world safer. First off, computers have enhanced our way of communicating. Computers have revolutionized...
Read MoreePortfolio entry 8
How can you tell if your computer is safe? Computers require specific attention and care to keep them from becoming vulnerable. There are a few key things to look out for when trying to tell if a computer is safe for use. 1 would be to make sure you have the most up to date operating and software system. Ensureing that your OS, antivirus software, and other...
Read MoreePortfolio entry # 7
What are the costs and benefits of developing cybersecurity programs in business? Developing a cybersecuiryt program in abusiness is something that is very important when it comes to the security of the nusiness. It is something that will cost alot but is a necessity when it comes down to it. when it comes to building a strong cynersecurity program in a...
Read MoreePortfolio entry #6
How has cyber technology created opportunities for workplace deviance? Workplace deviance is described as the deliberate desire to cause harm to an organization or workplace. With the implementation of so many technological devices such as laptops and PCs it has been made much more easier for employees to cause harm to a organization once they feel that they...
Read MoreePortfolio #5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Create app that rates software.Yacht GPS software that is secureBecome an independant cyber threat analystEcommerce securityRent out a space to a cybersecurity companySecurity auditingEventually get entry level security position Create cyber training courses Understand...
Read MoreePortfolio entry #4
Compare cybersecurity risks in the U.S. and another country. When it comes to comparing cybersecurity risks between countries, the first country that comes in my mind is my native country, Pakistan. Now when I think of Pakistan and cybersecurity the first thought that comes to mind is that there is no way pakistan has a stronger cybersecurity infrastructure...
Read MoreePortfolio entry #3
Describe four ethical issues that arise when storing electronic information about individuals. Taking the necessary steps for maintaining privacy and confidentiality is the primary issue and challenges every organisation faces while storing the individual information electronically. The individuals information should be only shared with the other persons if...
Read MoreWeek 12 – Journal Entry 14
After reviewing the article titled “11 illegal things you do unknowingly Do on the Internet” I was able to put aside 5 things that stood out to me as the most serious violations. First one would have to be bullying and trolling. Online bullying and trolling also known as cyber bullying, is something that should be prevented at all costs. There are...
Read MoreWeek 10 – Journal Entry 10
Social cybersecurity refers to the combination of cybersecurity and social factors. It concentrates on the understanding of things like human behaviors impact on cybersecurity protocols and practices. The article describes social cybersecurity as an emerging subdomain of national security. It tells us how it cybersecurity takes an influence from the social...
Read MoreArticle Review #1
The principles of social science involve studying the human behavior and society to understand how people interact and make choices. It can be involved in fields such as sociology, psychology, anthropology, economics, and in its own way, cybersecurity. I say cybersecurity because often, especially when it comes to battling cybercrimes, analysts must monitor and...
Read MorePowered by WordPress | Designed by Elegant Themes