Chief information security officer Yearningly taking the time to build businesses strategy/action plans Being the point of contact when an attack hits Experience in the field. Having experience will allow more job opportunities Rent out property to companies Selling Cybersecurity labor services Expert in skills that are in most demand regarding cybersecurity Certifications relating to IT/Cybersecurity …
Category: Uncategorized
Feb 23
How does your major relate to cybersecurity technology?
Cybersecurity is my major. I have always had a love for technology and how advanced we are getting in todays world. What interested me about Cybersecurity is how and what they do. Protecting computer systems and electronic data is important within a business and our government. If valuable information gets into the wrong hands it …
Feb 23
Googling My Own Name
When I googled my name as “Isis Jordan” nothing comes up with my personal information. All information and sites that show are sites regarding the terrorist group “ISIS” and how the country Jordan is their next target. But what I found interesting is when I type my full name into google “Isis Danielle Jordan” the …
Feb 23
Cyber security program in small businesses
Name: Isis Jordan Date: February 13, 2019 Details Small businesses are essential to our current economy. They are constantly growing, and at the moment there are a total of twenty-eight million small businesses in the United States alone. With all the small businesses, they play an imperative role not just in our economy, but also …
Feb 23
Cyber Security Engineers Role
Name: Isis Jordan Date: February 10, 2019 Details Every day our society constantly relies on our computers and other electronic devices we use every day and in our workplace. Our world constantly continues to revolve around computers and the hardware and software within it. With social media growing it has also become a potential security …
Feb 23
Staying ahead of Cyber Security
Name: Isis Jordan Date: February 2, 2019 Details Over the years the advancement of technology has sky rocketed and the use alone of the online world has increased. From the way we communicate with each other using our handheld devices and computers, or even the applications we use on our phones, tablets, computers, and any …
Feb 23
What is Framework
Name: Isis Jordan Date: January 27, 2019 Details When reading the “Framework for improving Critical infrastructure Cybersecurity” by the National Institute of Standards and Technology it simply explains how important and useful framework is to the United states. Also, how it is so reliable to our very own infrastructure. Giving the ability to the United …
Feb 18
A Brief Overview of the current threat landscape
Name: Isis Jordan Date: January 12, 2019 Details Most people do not understand the importance of Cybersecurity. When on social media they openly share their Name, age, DOB, phone number, and sometimes even their home address. That makes it easy for people in the hacking world to access their information. Facebook is a good example. …
- 1
- 2