• Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar
  • Skip to footer
Wooster

Technology@​Wooster

Collaborating with the campus community to explore questions of​ pedagogy, best practices, and technology integration.

  • For Students
    • What Technology do I need at Wooster
    • Computer Labs
    • Downloads
    • Wireless
    • Printing
    • E-Mail
    • Gaming Consoles
    • Poster Printing
  • I’d like to
  • Events
  • Staff
    • Applications Development
    • Educational Technology
      • About
    • Information and Planning
    • Research and Planning
    • Technology Services
      • Digital Infrastructure
      • Media and Event Support
      • Technology Services – Media Services
      • Technology Services – Service Desk
    • Student Digital Media Assistants
    • Student Research Assistants
    • Student Technology Assistants
  • Resources
    • ArcGIS Online
    • Hoonuit online training
    • Moodle
    • Professional Development
    • Projects in a Box
    • Qualtrics
    • Select Survey
    • WordPress(Voices)
    • Workshops
  • Technologies
    • Classroom Technology
      • Document Cameras
      • Epson Technologies
      • SMART Technologies
      • Student Response Systems
      • Video Conferencing
    • Digital Media
      • Audio
      • Images
      • Mobile Apps
      • Presentation
      • Video
    • Virtual Reality
      • VR Resources
      • Virtual Worlds
    • Web 2.0
      • Information Management
      • Mashups
      • Media Sharing
      • Social Communication
      • Social Knowledge Building
    • Web Authoring
      • Blogging
      • CMS
      • Wikis
  • Contact Us
    • Ed Tech Consultation
    • Tech Services Consultation
  • Change Your Password
  • Spam & Junk Email
  • IT Policies
  • IT Blog
You are here: Home → Cybersecurity

Cybersecurity

Illustration of databases and an injection

An Introduction to SQL Injection Attacks

This Cybersecurity month, I wanted to introduce everyone to one kind of vulnerabilities that can exploited to take advantage of web applications. Many websites we use every day depend on databases for their backend infrastructure. Databases can be created and managed using a programming language called Structured Query Language (SQL). Statements written in SQL to […]

Read More of An Introduction to SQL Injection Attacks

Filed Under: Cybersecurity Tagged With: cybersecurity, sql

A man in a red shirt looking at a screen. There is a lock symbol in a red bubble next to the man.

Cybersecurity Occupations

Happy Cybersecurity Month! Since it is Cybersecurity Month, it would be great to highlight career paths that can be present in Cybersecurity. Cybersecurity has become very prevalent and in demand since technology has become ubiquitous in our society. Cybersecurity is important because it helps to protect everyone’s information. Cybercrime Magazine gives a list of 50 […]

Read More of Cybersecurity Occupations

Filed Under: Cybersecurity

Data Breaches

Why should you care about data breaches and why are they a potential threat?  A data breach is a security incident where information is accessed without authorization. Other terms for this are data spill, unintentional information disclosure, data leak, and information leakage. Data breaches can harm businesses and consumers in many ways. As technology progresses, more information is spread throughout the digital world, making […]

Read More of Data Breaches

Filed Under: Cybersecurity

the words Stop Spam on a stop sign.

Keeping Data Safe

Happy Cyber Security Month! On Readwrite, Nirnay Butle, authors an article called “12 Things to Know About Cybersecurity Now.” In the article, it talks about ways people can lose their data which includes unauthorized links, spam messages, applications, weak privacy, and precaution. Here are some aways to keep your data safe: Internet links that have […]

Read More of Keeping Data Safe

Filed Under: Cybersecurity

Malware removal in a nutshell

Welcome to this quick tutorial (and collection of tips) on how to remove viruses from your machine using the power of free antivirus software and google! This guide is meant to be used alongside youtube and google when attempting to remove viruses from your devices at home Downloading an antivirus software and running frequent scans. […]

Read More of Malware removal in a nutshell

Filed Under: Cybersecurity

SPAM, Phishing and your Email

With cybersecurity month here, we wanted to remind you that the SPAM, and Phishing are the largest attacks against individuals. To help lessen this risk, messages that appear suspicious are being placed into a quarantine at Office 365. The vast majority of messages are correctly categorized, but there are a number of false positives. If […]

Read More of SPAM, Phishing and your Email

Filed Under: Cybersecurity, News

Collection of SIM cards

The Threat of SIM Swapping

A lot of online services and websites offer users the ability to protect their accounts using two-factor authentication through phone text. This post will go over a way that hackers have found in order to do just that. A SIM swapping is a technique used by a cyber-criminal in order to take control of accounts […]

Read More of The Threat of SIM Swapping

Filed Under: Cybersecurity

What is Malware?

Photo by Markus Spiske on Unsplash What is Malware? Malware, which is a combination of the words malicious and software, is an umbrella term for any kind of software designed with malicious intent.  Not all malware is destructive, though it can cause annoying behaviors such as generating an abundance of pop-up ads or cause your computer to run slowly. In […]

Read More of What is Malware?

Filed Under: Cybersecurity

Illustration of how a firewall works

What is the purpose of a firewall?

Even though we don’t think about it very often, network security is extremely important. This post is going to discuss a device that is used to enforce protection in networks. A firewall is a component that is used to monitor the incoming and outgoing traffic in a network. The term ‘firewall’ can be used to […]

Read More of What is the purpose of a firewall?

Filed Under: Cybersecurity Tagged With: cybersecurity, firewall

Primary Sidebar

Interesting Videos

Resources

  • We can help with…
  • Professional Development
  • Projects in a Box
  • Workshops
  • I.S. Support
  • Request an Appointment
  • ArcGIS Online
  • Hoonuit online training
  • Qualtrics
  • Poster Printing
  • Request a Wiki
  • Loaner Equipment

Copyright © 2021 · Technology Theme 3.0.0 on Genesis Framework · WordPress · Log in

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkNo
You can revoke your consent any time using the Revoke consent button.Revoke cookies