{"id":30,"date":"2024-03-24T18:35:31","date_gmt":"2024-03-24T18:35:31","guid":{"rendered":"https:\/\/student.wp.odu.edu\/tburc011\/?p=30"},"modified":"2024-03-24T18:35:33","modified_gmt":"2024-03-24T18:35:33","slug":"eportfolio-entry-9","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/tburc011\/2024\/03\/24\/eportfolio-entry-9\/","title":{"rendered":"eportfolio entry #9"},"content":{"rendered":"\n<p>More secure:<\/p>\n\n\n\n<p>Better Coordination and Communication: The use of computers in emergency response and disaster management operations has completely changed coordination and communication. Computer networks, mobile devices, and specialized software can all be used by emergency responders to exchange information in real time, plan rescue operations, and interact more effectively with impacted communities. During natural disasters, terrorist attacks, and other emergencies, this improved communication infrastructure has sped up emergency response times, improved situational awareness, and saved lives.Improved Surveillance and Monitoring: Thanks to computers, advanced surveillance systems for guarding borders, key infrastructure, and public areas may now be developed and implemented.Increased Cybersecurity Measures: Computers are now necessary instruments for putting strong cybersecurity measures in place to safeguard sensitive data, networks, and systems in light of the growth of cyber threats and digital attacks. Installing intrusion detection systems, firewalls, antivirus software, and encryption tools can help individuals and organizations protect against cyber threats and lower their risk of ransomware attacks, data breaches, and other harmful activity.<\/p>\n\n\n\n<p>Not as Safe:<\/p>\n\n\n\n<p>Cyberthreats and Cybercrime: Computers have made it easier for cyberthreats and cybercrime to proliferate, which presents serious obstacles to international safety and security. Malicious actors use software, networks, and computer system vulnerabilities to perform a variety of cyberattacks, including denial-of-service (DoS) attacks, phishing scams, and malware infections. These actors include hackers, cybercriminals, and state-sponsored adversaries.Technology has become more weaponized thanks to computers, which have made it possible for both nation-states and non-state entities to create and use offensive cyber capabilities and weapons.Privacy Violations and Surveillance Abuse: With the increasing use of computers and digital technologies, worries regarding privacy violations and abuses of surveillance by businesses, governments, and other entities have been brought up.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>More secure: Better Coordination and Communication: The use of computers in emergency response and disaster management operations has completely changed coordination and communication. Computer networks, mobile devices, and specialized software can all be used by emergency responders to exchange information in real time, plan rescue operations, and interact more effectively with impacted communities. During natural &hellip; <a href=\"https:\/\/student.wp.odu.edu\/tburc011\/2024\/03\/24\/eportfolio-entry-9\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">eportfolio entry #9<\/span><\/a><\/p>\n","protected":false},"author":26349,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/posts\/30"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/users\/26349"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/comments?post=30"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/posts\/30\/revisions"}],"predecessor-version":[{"id":31,"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/posts\/30\/revisions\/31"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/media?parent=30"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/categories?post=30"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/tags?post=30"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}