Discover The CTU Experience
In recognition of Cybersecurity Awareness month in October, our faculty offer insights on both policy and technical issues related to cybersecurity. In our second post of the series, Bruce Harmon, Ph.D., took a look at the defining terminology making its way into our culture. In today’s post, Stephen Recca, M.A., takes a look at four cybersecurity threats from a policy perspective.
These days, everyone is vulnerable to cybercrime and other breaches to the security of their digital systems and identity. Our world is increasingly connected through computers, smart phones and tablets and an exploding number of apps. This influx of technology makes for that many more digital portals to protect.
Cyber is in. Government officials share worries over cybersecurity. The Intelligence Community warns of cyber threats from nation states, anarchist groups and lone wolves. Civil liberties watch groups decry infringements of privacy and individual rights by state-sponsored cyber eavesdropping.
Those who work in information technology know that it can be an exciting yet fast-paced environment. Modern firms have demanding needs to stay on top of the ever-evolving trends in the technical space. Talented individuals are needed to help solve complex technical problems with creative solutions.
Another technology is making inroads into our professional lives, while experts begin to weigh its benefits against the security risks.
Energy is a familiar topic during election seasons. Presidential candidates offer a variety of ideas on how they plan to reduce our nation’s dependency on foreign oil, calling for innovations within the industry.
How secure is your business from a cyber attack? If your organization is attacked, what will you lose, both in the attack and in the aftermath or recovery?
While it may seem like science fiction, modern advances in semiconductor manufacturing meant to support denser integrated circuits, or chips, will soon have us trying to imprint transistors and interconnect of a size less than ten nanometers. According to the International Technology Roadmap for Semiconductors, known throughout the world as the ITRS, this scale will be near the size of individual molecules. This progress raises the question: could molecules be made to serve as transistors and interconnect?
After years of teaching online with my focus on psychology and sociology, it’s interesting to observe how the way we communicate has changed with the growth of the Internet.
We need to take a hard look at our cybersecurity policy and ensure those that that frame it are the best minds private and public sectors can bring to the table.
If you want to speak like a computer expert, it helps to do your research on computers, Internet trends, and the latest technological advances. To start learning the technical jargon, here’s a list of ten terms that you should know.
Attempting to fix your computer is stressful enough, so scrambling around to find backup discs and paperwork only makes it worse. You can improve the situation, however, by assembling the right tools and materials before you start the repairs.
What is all this hype over cloud computing? Is it really something new under the sun? As one who has witnessed the last forty years of computing technology, I say yes and no.
The recent press coverage of the “Flame” computer virus, which computer security experts have purportedly been aware of since 2010, underscores changes that have been occurring in intelligence-gathering and warfare.
Sometimes our computers act so bizarrely that we can no longer deny that some kind of malware, or malicious software, has caught us off guard. Downloading an antivirus program and using the Internet carefully are great ways to protect your computer, but cluttering your system with unnecessary and even dangerous files and programs is inevitable.
Copyright © 2016 Colorado Technical University (CTU). All rights reserved. No information may be duplicated without CTU's permission. The CTU logo is a registered trademark of Career Education Corporation. CTU cannot guarantee employment or salary. Not all programs are available to residents of all states. Programs vary by location and modality; see catalog for details. Financial aid is available for those who qualify. See the Accreditation & Licensure section for information on the agencies that approve and regulate the school's programs, including relevant complaint procedures here. Find employment rates, financial obligations and other disclosures below.