1. Describe three ways that computers have made the world safer and less safe. Computers have made the world safe in a plethora of ways. Starting with communication, we can now communicate in a instant with computers and transfer all… Continue Reading →
1. How can you tell if your computer is safe? If your notice your computer or laptop having symptoms such as it suddenly slowing down in performance, shutting down randomly or restarting, missing files or other information stored, frequent systems crashes,… Continue Reading →
1. What are the costs and benefits of developing cybersecurity programs in business? The costs and benefits of cybersecurity programs in business will vary per the size of the companies and needs. The average cost for cybersecurity is 10% of the… Continue Reading →
How has cyber technology created opportunities for workplace deviance? Workplace deviance can be describe as the deliberate desire to cause harm to an organization. Cyber technology has a large range in opportunity for deviance behavior. Blockchain exposure is a example… Continue Reading →
Create app that rates software.Yacht GPS software that is secureBlue team service workers that practice protecting companies from attacksEmploy service workers to do work for you (CEO)Report vulnerabilities as a red teamerSecure network vulnerabilities Expand cyber protection for companies Create firewalls to protect… Continue Reading →
Compare cybersecurity risks in the U.S. and another country. Social engineering is one of the most dangerous hacking techniques by cybercriminals. This is primarily because it is caused by human error rather than a technicality. Russia is a country that… Continue Reading →
. Describe four ethical issues that arise when storing electronic information about individuals. Confidentiality is an ethical issue that arises when electronic information about individuals is stored. The issues that may occur are breaches within the encrypted data per individuals. It… Continue Reading →
Four other majors that relate to cybersecurity that are offered by ODU would: Computer science, Information technology, cyber-operations computer-engineering and IT management. Computer science involves the study of computers and programming languages; whereas, cybersecurity is the focus of computer and… Continue Reading →
During my childhood I was always intrigued in technology and overtime I became very savvy with the newer technologies as they would be released each year. Over the course of those years I would play video games and would unfortunately… Continue Reading →
© 2025 Kiori Edwards ePortfolio — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑