Types of security risk within an organisation and how they can be prevented

Task 1: Identify the types security risks within an organisation and how they can be prevented. For this first task, I will be examining some of the potential risks which can be found in an organisation and a solution for how they can be prevented. In the subheading below, I will make sure to explain five … Read more

Overview of cybercrime

With the recent advances in technology, cybercrime is at an all-time high. Computer crime has been an issue in criminal justice and criminology since the 1970s. However, many of those crimes were directed towards businesses, government agencies, or universities. As they have transitioned to virtually anyone, cybercrime is certainly one of the most serious modern … Read more

Cyber security – online shopping/payment

Introduction Assignment discussion This assignment-based report is in relation to cyber security in a particular social context. The social context I have chosen to write on is the well-known topic of online shopping/payment. A wide variety of literatures will be studied, analysed and reviewed in order to compile a decisive view on this context. The … Read more

Risk Assessment procedures and cybersecurity in business

Assessment, mitigation and contingency The objectives of risk assessments are to assess the risks and identify the minor acceptable risks versus the major unacceptable risks. Then to act accordingly by comparing the risk level to a pre-determined set of standards of acceptability. There are number of ways to assess risks that can involve quantitative, qualitative … Read more

Cyber security management in the energy industry

This security policy document is prepared as a computer security consultant with a firm with an international base. This risks and threats in the field of gas utilities supplies are increasing as new operational concepts and digital technologies are evading the gas utility industry. According to the company, grown state of cyber-attacks and sophistication of … Read more

Future of Cybersecurity General Assembly 1

Topic: Future of Cybersecurity Committee: General Assembly 1 Main Submitter: Sweden Signatories: India, Brazil , Haiti, Nigeria, Philippines , Mexico Aware of the possible, immeasurable threat posed by cyber terrorism, Recognizing the role of the General Assembly in addressing the issue of cyber warfare, in accordance with the Charter of the United Nations, Considers cyber … Read more

Data anonymization product analysis (inc. SWOT)

1. Introduction Today, data is more important than ever. Across every industry today, there is the possibility to uncover unprecedented insights from the datasets that many organizations hold. There have been many advancements in technology due to relevant information found in data. Access to data is important for utilizing many technological innovations such as machine … Read more

Ethical and Legal Issues in IT- Canvas Submission

The Oireachtas A. The Oireachtas is there to make laws for Ireland, but they must not enact laws that are repugnant to the constitution. The Oireachtas elects the government and the funding for the departments must be approved by the Oireachtas. The Oireachtas makes sure the government takes responsibilities for their actions. Dáil Éireann, Seanad … Read more

Technology in a Minor’s Life

Technology has been an extremely influential medium in our lives. It has ingrained itself deeply into our countries, politics, social life, and our new generations. Ionel Pintilii takes on the topic of the influence of technology and the internet on a child’s life in his article “Pleading Against Excess of Internet Utilization in Children and … Read more

Tackling misinformation on social media

As the world of social media expands, the ratio of miscommunication rises as more organisations hop on the bandwagon of utilising the digital realm to their advantage. Twitter, Facebook, Instagram, online forums and other websites become the pinnacle of news gathering for many individuals. Information becomes easily accessible to all walks of life meaning that … Read more

Emergence of Augmented reality (AR) and Virtual reality (VR)

Abstract Augmented and virtual reality have been used widely in Science, Technology, Engineering and Mathematics. These technologies promise to change our lives unlike any other. While VR replaces your vision, AR adds reality to it. From learning new skills to being able to meet people virtually but with an immerse experience with the help of … Read more

Report on my internship (GenSight)

1. Introduction The internship is a great opportunity for students offered by an organization to gain practical experience and knowledge in an Industry. This report is designed for the purpose of presenting my overall placement experience of the company, in which I completed, was placed and worked. There are two sections in this report. The … Read more

How to complement an Anti-virus in order to protect an SME sufficiently?

Abstract A network can be prone to cyber-attacks, and with the advancement of information technology an attack can happen at any time, to withstand these attacks security policy, security frameworks and tools are developed and utilised within a network. It is common for an SME, as compared to a multinational corporation’s network infrastructure, to lack … Read more

Technical understanding of design and implementation of Monopoly (Java)

Abstract Monopoly has been integrated into learning environments from the primary academic years of students as an activity stimulus for strategic thinking. A creative “Medway” based monopoly game does not only provide a way of digital strategic learning but eliminates the need of a player-banker. In addition, contemporary studies highlight the use of the Monopoly … Read more