Computer Science Program Resources
What is the Best Programming Language for Data Science?
The debate over which programming language is best has raged through the ages – or at least, for the past couple of years. So overworked and seemingly endless have the disagreements become among computer programmers in recent years that humorists from the field sometimes claim that Socrates preferred Python while Plato was an advocate of Julia.
Bring Your Own Device: A Security Challenge
It should come as no surprise that employees are using personal devices to complete company business. In a recent survey 60 percent of employees are allowed to connect their devices to their corporate network.
How Big Data is Transforming Information Security
Big Data has changed the very nature of the information security field. Over the last several years, the concept of seemingly impossibly large amounts of consumer and industry data (aka Big Data) has made frequent appearances in the news due to the questions it raises about information security and privacy on the public, private, consumer, government and business levels.
What is Information Security?
At the most basic level, information security refers to the practice of protecting information from unauthorized access, modification and destruction. In today’s increasingly technology-driven world a company’s information assets are often key to their business and the bad guys know it.
Top 3 High Profile Information Security Breaches of the 21st Century
Rapid technological advancement has shaped the quality of human life over the last fifty years. From travelling to the moon to the rise of cell phones to medical advancement, technology has allowed modern man to go further, connect more and live longer and healthier than ever before. However, this massive cultural dependence on technology has put just as much at risk if not more than it has advanced or improved. The major (and myriad) information security breaches of the 21st century have shown us that the Achilles heel in our national security and financial structures may be the very thing that propels us forward: our technology systems. Here are three of the top high profile information security breaches in the 21st century, what they tell us about our technological weaknesses, and why individuals who receive their MS in Information Security are key defenders of civilization at the next great frontier.