Tag Archives: Cybersecurity

Final Proposal: Cryptology and Quantum

My final research proposal dove into the topics of quantum computing power and its effects on cryptology and then compared that topic with the effects that would have on societies willingness to still utilize information sharing platforms, such as the internet, in an environment where data security has a lower likelihood. The hypothesis that I … Continue reading Final Proposal: Cryptology and Quantum

Quantum Effects on Cryptology: New Databases

The database that I utilized for the search was ABI/INFORM. I utilized several different Boolean Operators that I had not used on this database yet. The information I have found should steer me in the right direction to conduct a deep dive into the effects of quantum computing and quantum networks on cryptography and cyber … Continue reading Quantum Effects on Cryptology: New Databases

Advanced Searching: Quantum and Cryptography

The database that I utilized for the search was Computer Source through EBSCOhost. I added and altered several different combinations of Boolean operators in order to try and find the best results for my proposal. The information I have found should steer me in the right direction to conduct a deep dive into the effects … Continue reading Advanced Searching: Quantum and Cryptography

The Future of Encryption

For my sources I chose Computer Source and Applied Science & Technology.  I’m focusing on what types of cryptography are going to be used in the future, but would also like to include information on implementations of this cryptography.  I included information about FPGAs, since those would allow for very fast hardware implementations of these … Continue reading The Future of Encryption

Quantum and Cryptography

The two databases that I have chosen to use for this assignment are Computer Source and Faulkner’s Advisory for IT Studies. My main focus will be on how quantum computing will potentially effect cryptology as it progresses. The information found should give me a great head start on gathering the information that is required.   … Continue reading Quantum and Cryptography

Quantum, More Power but Less Privacy

Your initial research idea and your current research idea. If there are changes, tell us how they are different and why. What led you to change your focus? I have chosen to make a complete topic change from what I was considering in week one. The main driver behind this change is that after doing … Continue reading Quantum, More Power but Less Privacy

Week 6 DB Gender Differences and Employees’ Cybersecurity Behaviors

1. Provide the citation and attach a pdf of the article. (10 pts) Mohd, et al., 2017: Gender Difference and Employees’ Cybersecurity Behavior Gender Difference and Employees Cybersecurity Behaviors 2. What is the abstract of the article? (10 pts) Abstract Security breaches are prevalent in organizations and many of the breaches are attributed to human … Continue reading Week 6 DB Gender Differences and Employees’ Cybersecurity Behaviors

Expanding Horizons With New Employers!

The four companies I decided to research for this project are Cerner, Cisco, McAfee, and Code42. I chose these companies because I have a strong interest in cybersecurity as well as software engineering and programming, which all of these companies have a focus in. The majority of these companies are rather large scale and would … Continue reading Expanding Horizons With New Employers!