Digital Asset Ownership and Security Discussion Board Forum 1
VerifiedAdded on 2023/06/11
|5
|755
|494
Discussion Board Post
AI Summary
This discussion board post identifies digital assets owned by students, such as software and electronic devices, emphasizing their importance in academic work. It addresses the biblical principles related to theft and the security risks associated with digital assets, suggesting measures like encryption and strong passwords for protection. The post also includes replies to classmates, discussing the importance of digital assets for organizations and specific examples of university-owned digital assets, highlighting the need for robust security protocols. Desklib provides access to this solution along with a wealth of study resources, including past papers and solved assignments, to support students in their academic endeavors.

Running head: COMPUTER SECURITY ENGINEERING
Computer Security Engineering
[Name of the Student]
[Name of the University]
[Author note]
Computer Security Engineering
[Name of the Student]
[Name of the University]
[Author note]
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2COMPUTER SECURITY ENGINEERING
[Time]
[Name of the Student]
Discussion Board Forum 1
According to the definition digital asset it can stated that this are the electronic objects which
consists of a value for a particular reason. This might be crated digitally or might have been
digitalized from a non-digital original source. The digital assets mainly includes the processing
of the documents, database, websites, organizational records and the digital recordings and many
more. Two of the major digital assets that are owned by the students includes the various
software programs which are used by the student in order to complete their assignments like the
Microsoft word, Microsoft Excel and many more and the second one is the electronic devices
where they store their information, videos, pictures and many more. The digital electronics
mainly includes the laptops and other smart devices. The software is generally considered as a
form of code and the deployed services. This type of assets are very much important because
they are associated with helping the students in conducting their daily operations inside the
university. Without the presence of software the working of the students would become much
more difficult.
According to the Bible Ephesians 4:28 “He who steals must steal no longer; but rather he must
labor, performing with his own hands what is good, so that he will have something to share with
one who has need.” The digitals are assets are owned so any usage of the assets without the
consent of the user is considered as a type of theft. Being digital various types of risks are faced
by the assets which includes the tampering of stealing of the dat. Along with this according to the
Leviticus 19:11 “'You shall not steal, nor deal falsely, nor lie to one another.”. One way of
[Time]
[Name of the Student]
Discussion Board Forum 1
According to the definition digital asset it can stated that this are the electronic objects which
consists of a value for a particular reason. This might be crated digitally or might have been
digitalized from a non-digital original source. The digital assets mainly includes the processing
of the documents, database, websites, organizational records and the digital recordings and many
more. Two of the major digital assets that are owned by the students includes the various
software programs which are used by the student in order to complete their assignments like the
Microsoft word, Microsoft Excel and many more and the second one is the electronic devices
where they store their information, videos, pictures and many more. The digital electronics
mainly includes the laptops and other smart devices. The software is generally considered as a
form of code and the deployed services. This type of assets are very much important because
they are associated with helping the students in conducting their daily operations inside the
university. Without the presence of software the working of the students would become much
more difficult.
According to the Bible Ephesians 4:28 “He who steals must steal no longer; but rather he must
labor, performing with his own hands what is good, so that he will have something to share with
one who has need.” The digitals are assets are owned so any usage of the assets without the
consent of the user is considered as a type of theft. Being digital various types of risks are faced
by the assets which includes the tampering of stealing of the dat. Along with this according to the
Leviticus 19:11 “'You shall not steal, nor deal falsely, nor lie to one another.”. One way of

3COMPUTER SECURITY ENGINEERING
protecting the data is by encryption of the documents created by making use of the software.
Another way of protecting media file present in the laptops is by using of strong passwords.
Other type of security measures are also to be adopted by the students in order to protect
themselves from any kind of threat.
protecting the data is by encryption of the documents created by making use of the software.
Another way of protecting media file present in the laptops is by using of strong passwords.
Other type of security measures are also to be adopted by the students in order to protect
themselves from any kind of threat.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4COMPUTER SECURITY ENGINEERING
References:
Meso, P., Ding, Y., & Xu, S. (2013). Applying protection motivation theory to information
security training for college students. Journal of Information Privacy and Security, 9(1),
47-67.
Drachsler, H., & Greller, W. (2016, April). Privacy and analytics: it's a DELICATE issue a
checklist for trusted learning analytics. In Proceedings of the sixth international
conference on learning analytics & knowledge (pp. 89-98). ACM.
References:
Meso, P., Ding, Y., & Xu, S. (2013). Applying protection motivation theory to information
security training for college students. Journal of Information Privacy and Security, 9(1),
47-67.
Drachsler, H., & Greller, W. (2016, April). Privacy and analytics: it's a DELICATE issue a
checklist for trusted learning analytics. In Proceedings of the sixth international
conference on learning analytics & knowledge (pp. 89-98). ACM.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5COMPUTER SECURITY ENGINEERING
Reply to Kevin Graham
Thank you Mr. Kevin Graham for your letter (Importance of Digital assets for the organization).
The digital assets are associated with providing a lot of benefits which opens up numerous
direction for the employees to work in a proper way. Besides this the digital assets contains
many information which are very vital for the organization as well as for the employees.
The organization should be thinking of more innovative ways to utilize the digital assets and
along with this they should also think of protecting their digital assets like the other companies
are doing in order to protect their assets from any kind of thefts.
Reply to Matthew Geiser
Thank you Mr. Matthew Geiser for your letter (Digital Assets and Theft).
The digitals assets of the Liberty University are the logos and the website. This two assets have
been associated with providing service on a regular basis not only for the employees but also for
the students as well. The students have to access the websites every day for all their class
assignments. The security risk is one of the major issue which can affect the overall organization.
The University should think of more ways in order to protect the assets that they are having by
making use of appropriate protocols along with adaptation of other innovative methods.
Reply to Kevin Graham
Thank you Mr. Kevin Graham for your letter (Importance of Digital assets for the organization).
The digital assets are associated with providing a lot of benefits which opens up numerous
direction for the employees to work in a proper way. Besides this the digital assets contains
many information which are very vital for the organization as well as for the employees.
The organization should be thinking of more innovative ways to utilize the digital assets and
along with this they should also think of protecting their digital assets like the other companies
are doing in order to protect their assets from any kind of thefts.
Reply to Matthew Geiser
Thank you Mr. Matthew Geiser for your letter (Digital Assets and Theft).
The digitals assets of the Liberty University are the logos and the website. This two assets have
been associated with providing service on a regular basis not only for the employees but also for
the students as well. The students have to access the websites every day for all their class
assignments. The security risk is one of the major issue which can affect the overall organization.
The University should think of more ways in order to protect the assets that they are having by
making use of appropriate protocols along with adaptation of other innovative methods.
1 out of 5
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.