• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Digital Systems

Department of Management Information Systems, Temple University

Digital Systems

MIS 2101.730 ■ Spring 2023 ■ Steven E. Sclarow, AIA
  • Home
  • About
    • Course Materials
    • Course Requirements
    • Email Policy
    • Grading
    • Gradebook
    • Instructor
    • Temple and COVID-19
    • Zoom Requirements
    • Zoom Links
  • Canvas Content
  • Coding Files
  • Helpdesk
  • Zoom Links
  • Video Vault
  • Diamond Peer Corner
  • Posts
    • 1a Questions
    • 1b Questions
    • 2a Questions
    • 2b Questions
    • 3a Questions
    • 3b Questions
    • 4a Questions
    • 4b Questions
    • 5a Questions
    • 5b Questions
    • 6a Questions
    • 6b Questions
    • 7a Questions

4b Cyber security

Paige Willis - March 2, 2023 Leave a Comment

When dealing with data protection and cyber security it is crucial to follow the regulations involved with both. Luckily, there are both federal and state legislature laws put in place to safeguard your online information. Some things they protect against are cyber attacks, viruses and worms, unauthorized access, and so on, If you do not comply with these laws, it will result in significant fines and penalties. Under the Data Protection Act of 2018, “you have the right to find out what information the government and other organizations store about you” and how that information is being used.

  One type of malicious software that is detrimental to your cyber security is ransomware. This software literally restricts a user’s ability to access their computer until a ransome is paid, then they are granted access. This attempt at extortion usually comes to fruition through encrypted files. A huge target for this ransomware is hospitals. For one, hospitals rely on up-to-date medical information and depend on their systems running smoothly and effectively. An attack on a hospital not only disrupts a patient’s care, but costs the institution millions. 

 

https://www.gov.uk/data-protection#:~:text=Under%20the%20Data%20Protection%20Act,have%20incorrect%20data%20updated

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

ANNOUNCEMENTS & POSTS

What is HTML and how it is used in our everyday lives! Part 2

The coding language that adds design elements to a web page is Cascading … [More...] about What is HTML and how it is used in our everyday lives! Part 2

What is HTML and how it is used in our everyday lives! Part 1

The coding language that adds structure to a web page is HTML (Hypertext … [More...] about What is HTML and how it is used in our everyday lives! Part 1

What are Loops?

Why do we use loops? Loops are used in programming to execute a set of … [More...] about What are Loops?

Importance of IF/ELSE Statements!

Why do we use if/else statements? We use if/else statements in programming … [More...] about Importance of IF/ELSE Statements!

The Functioning of JavaScript

A function in JavaScript is a block of code designed to perform a specific … [More...] about The Functioning of JavaScript

What does JavaScript mean to you? Read more to find out what it means to Shivam Joshi!

A variable in JavaScript is a container that holds a value, which can be a … [More...] about What does JavaScript mean to you? Read more to find out what it means to Shivam Joshi!

ITA CONTACT INFO

Tarisha Sarker - Diamond Peer

Email: tarisha.sarker@temple.edu
Office Hours: Monday, 3-5 PM
Zoom Link: https://temple.zoom.us/j/91454347337

Instructor

Steven E. Sclarow, AIA

Email: sclarow@temple.edu
Office Hours Availability: M | W, 9:30 - 10:30 AM, or by appointment. Please email me if you need to schedule an appointment outside of my normal office hours.
Zoom Link: https://temple.zoom.us/j/96464375557

Helpful Links

FOX Laptop Policy

Gradebook

Installing-VS-Code-Windows
Installing-VS-Code-Mac-OS

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University