• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Digital Systems

Department of Management Information Systems, Temple University

Digital Systems

MIS 2101.730 ■ Spring 2023 ■ Steven E. Sclarow, AIA
  • Home
  • About
    • Course Materials
    • Course Requirements
    • Email Policy
    • Grading
    • Gradebook
    • Instructor
    • Temple and COVID-19
    • Zoom Requirements
    • Zoom Links
  • Canvas Content
  • Coding Files
  • Helpdesk
  • Zoom Links
  • Video Vault
  • Diamond Peer Corner
  • Posts
    • 1a Questions
    • 1b Questions
    • 2a Questions
    • 2b Questions
    • 3a Questions
    • 3b Questions
    • 4a Questions
    • 4b Questions
    • 5a Questions
    • 5b Questions
    • 6a Questions
    • 6b Questions
    • 7a Questions

Cybersecurity and Privacy – 4b

Aidan Morgan - March 2, 2023 1 Comment

A major issue today in technology is cybersecurity and protection one’s information. Unfortunately as technology advances, more ways to invade and breach it is discovered. One of these ways is threat modeling. Threat modeling is one of the most important components of staying secure online as it is the process of identifying ways to stay secure on the Internet. Prevalent questions when protecting your information could include: What do you want to protect? Who do you want to protect it from? How likely is it that you need to protect it? How bad are the consequences if you fail? and How much trouble are you willing to go through in order to try to prevent those consequences? By answering these questions, people can figure out solutions to protect them and find a threat model that works. One great method to protect yourself online is Two-Factor Authorization (2FA), which would be an extra step to logging in such as an email or text message after typing in your password on a certain website. Another method gaining popularity today is using a VPN. A VPN, or Virtual Private Network, is a service that helps users stay private when browsing online. VPNs are great for protecting information when traveling to other networks outside of your home. Alan Turing was a computer scientist and helped crack the code for the Allies during WWII. His creation during WWII influenced the idea of the computer. The Turing Test, named after Turing, is the method of determining whether or not a machine, or AI can demonstrate human intelligence. If AI can engage in conversation with humans without being detected as AI, then it has demonstrated human intelligence.

Reader Interactions

Comments

  1. Levan Lobjanidze says

    March 2, 2023 at 8:53 pm

    Yes, this would be helpful for me if I knew before. My social network account was hacked when I used a public Wi-Fi. If I modeled my digital ID security better, that wouldn’t happen.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

ANNOUNCEMENTS & POSTS

What is HTML and how it is used in our everyday lives! Part 2

The coding language that adds design elements to a web page is Cascading … [More...] about What is HTML and how it is used in our everyday lives! Part 2

What is HTML and how it is used in our everyday lives! Part 1

The coding language that adds structure to a web page is HTML (Hypertext … [More...] about What is HTML and how it is used in our everyday lives! Part 1

What are Loops?

Why do we use loops? Loops are used in programming to execute a set of … [More...] about What are Loops?

Importance of IF/ELSE Statements!

Why do we use if/else statements? We use if/else statements in programming … [More...] about Importance of IF/ELSE Statements!

The Functioning of JavaScript

A function in JavaScript is a block of code designed to perform a specific … [More...] about The Functioning of JavaScript

What does JavaScript mean to you? Read more to find out what it means to Shivam Joshi!

A variable in JavaScript is a container that holds a value, which can be a … [More...] about What does JavaScript mean to you? Read more to find out what it means to Shivam Joshi!

ITA CONTACT INFO

Tarisha Sarker - Diamond Peer

Email: tarisha.sarker@temple.edu
Office Hours: Monday, 3-5 PM
Zoom Link: https://temple.zoom.us/j/91454347337

Instructor

Steven E. Sclarow, AIA

Email: sclarow@temple.edu
Office Hours Availability: M | W, 9:30 - 10:30 AM, or by appointment. Please email me if you need to schedule an appointment outside of my normal office hours.
Zoom Link: https://temple.zoom.us/j/96464375557

Helpful Links

FOX Laptop Policy

Gradebook

Installing-VS-Code-Windows
Installing-VS-Code-Mac-OS

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University