Category: Uncategorized

Regulations

Regulations Name: Isis Jordan Date: April 28, 2019 Details As a society we are used to having technology so easily accessible to us. We have become dependent on technology in our daily lives. But as the rise in technology becomes more integrated into our lives, the federal regulatory agencies are tasked with trying to keep …

Continue reading

How we approach Cyber-policy and infrastructure

How we approach Cyber-policy and infrastructure Name: Isis Jordan Date: April 17, 2019 Details A cyber security policy is a guideline that helps in the preservations of the security of data, and the technological infrastructure. The more we put trust in technology to store, collect, and manage our information, the more we become vulnerable to …

Continue reading

Cyber Crimes between Offenders and Victims

Cyber Crimes between Offenders and Victims Name: Isis Jordan Date: April 10, 2019 Details The amount of crimes being committed using technology has grown tremendously over the years. In order to keep up with all the different crimes that can be committed online means constantly learning new ways to fight them, and new technology to …

Continue reading

CJ and Cyber Security

CJ and Cyber Security Name: Isis Jordan Date: April 6, 2019 Details Crime will always be present. It will continue to be a flourishing business, especially in the technology world. Cyber security has not been around long, and when it was needed back then, the technology was not as advanced as it is today to …

Continue reading

Deviance in Cyber Security

Deviance in Cyber Security Name: Isis Jordan Date: March 24, 2019 Details Businesses strive to make the work environment comfortable for every employee. That includes the teamwork between each employee to help with the productivity. But the size of the organization does not matter or is prone to deviant behavior. Deviance can occur in every …

Continue reading

Cyber Security Engineers

Cyber Security Engineers Name: Isis Jordan Date: March 18, 2019 Details Cyber Security engineers are people who help us protect our computers within a work place and the network we use to do our work. Every day they are fighting off cyber-attacks and anyone trying to hack into any companies’ systems, they help fill the …

Continue reading

Cybersecurity Risk in the US and Japan

Cybersecurity Risk in the US and Japan Name: Isis Jordan Date: February 26, 2019 Details New cybersecurity threats develop every day and develop ways to fight them changes constantly. A new era of strategic competition demands a new cyber strategy that responds to new realities, deters adversaries, reduces vulnerabilities, and safeguard opportunities for the American …

Continue reading

Framework for handling Security Incidents

Framework for handling Security Incidents Name: Isis Jordan Date: March 3, 2018 Details Having a computer incident response team has become an important part of cybersecurity. With the amount of attacks rising, they are becoming more damaging. Preventive activities based on the results of risk assessments can potentially lower the number of incidents, but not …

Continue reading

What are the costs and benefits of developing cybersecurity programs in business?

What are the costs and benefits of developing cybersecurity programs in business?   Name: Isis Jordan   Details   Cyber-attacks and data breaches can cost a business millions of dollars depending on how serious the attack is. Depending on what information was compromised can determine the cost of a breach to business. A business can …

Continue reading

3 Ways Computers have made our world Safer

Name: Isis Jordan Date: February 24, 2019 Details In today’s society almost every part of our day revolves around computers. I believe computers have made our world safer and easier to live in. There are many advantages of computers and ways it has benefited us to make our world a better place. But not all …

Continue reading