Contact Admissions: (866) 967-7046

email: onlineprograms@lewisu.edu

Computer Science Program Resources

The Evolution of the Computer Virus

Computer viruses have been plaguing individuals, organizations and government agencies for the past 40 years. Evolving over time, these viruses have kept pace with the newest advances in technology, much to the consternation of information technicians who work to keep networks and systems safe. With a rise in technological advances, society increasingly becomes at risk for hackers or other forms of cyber-attacks. Identifying how computer viruses have grown over time helps the unsung heroes of systems information keep our data safe.


Security Concerns in the Cloud

New methods of data storage have been introduced in the past decade, and as the world of information technology moves forward, advanced security measures are being taken to ensure the protection of user identities and data. Cloud Storage in particular is being scrutinized for its security dependability.


Security Concerns for Wireless Systems

Wireless systems have become the norm in recent years for efficient, functional businesses and homes. Home Internet providers now offer wireless coverage plans to accommodate a range of devices for an average sized family, and public businesses such as coffee shops, restaurants and shopping malls now routinely offer free wireless internet access for patrons. However, wireless systems have notable vulnerabilities and concerns that need to be addressed and monitored in order to maintain secure data, proprietary content and financial records. Read on to learn more about the kinds of security breaches that can occur between point A and point b on a wireless route, and what preventative measures can be taken to avoid or derail such attacks.


NSA's Surveillance Program: PRISM

In May, Edward Snowden, a former contractor for the NSA, broke his confidentiality agreement and came forward to the American news press about the NSA's surveillance program, PRISM. He told his story to both The Guardian and The Washington Post. Hailed by some as a whistleblower and denounced by others as being a traitor, Snowden is now a political fugitive with asylum in Russia. Whether Snowden is a patriotic talebearer or a devious turncoat, the issues he raised about the NSA's intrusion on privacy cannot be ignored.


Insider Threat Detection

Companies and the information they house are exposed by a variety of attacks that could destroy or manipulate electronic information, unless adequately protected. Most people see these attacks as a threat from outside of the organization, as most viruses and malware make their way into the system from external sources. However, in many cases, the greatest threats to companies originate inside their own system.


Information Security, Cyber Security, and Job Security

The world of digital security is constantly evolving and adapting to fight threats from attacks around the world. Advances in technology and improved accessibility lead to ever-increasing amounts of data and online transactions that need to be protected. While many might expect the majority of these jobs to be in local, state and federal government, you may be surprised to learn that a large number of information security jobs also appear in industries like healthcare, financial services, professional services and retail.


Pages