Week 8 – Cybersecurity

23andMe Data Breach Find one concrete example of “bad behavior” in the online space. Who was involved, and what was the outcome? Was there financial loss or damage to someone’s reputation? Were the criminals held accountable? What practical lessons...

Privacy, Security, Hacks, and Leaks

Know your enemy: What are 5 sources/types of potential digital threats to your organization? 1. AI-Powered Cyber-Attacks AI attacks can be far more powerful than traditional ones. AI is able to analyze large amounts of information fast, it can mimic the tone and...

Where Can You Turn to for Help?

SchaefaerArt SchaefaerArt is a YouTube channel that covers many aspects of art that I’ve found myself having questions about. This channel keeps updated some, but they used to post alot. The artist who heads up the channel seems to be having artistic burnout, which...

Content Management Systems (CMS)

1. Briefly define what we mean by “content management system.” Is it just for websites? A Content Management System (CMS, for short) is a tool that handles all the basic infrastructure, allowing you to do what you need without having to code. There are two...

Evolution of the Web

1. Today, do more people access the web using computers or mobile devices? As of late 2016, the global use of mobile devices to access the web has beaten desktop usage. But the US is still on the border, almost 50/50 each year between mobile and desktop. (source:...