CYSE 368 FINAL REFLECTION

1 04/017/2026 Justin Saldivar Kim Ward Virginia Air and Space Science Center Professor Teresa Duvall/TA Joshua Russell CYSE 368 Spring 2026 2 TABLE OF CONTENTS 3.INTRODUCTIONS AND OBJECTIVES 4.GENERAL ENVIRONMENT 5.MAJOR DUTIES 6.USAGE OF SKILLS PRESENT 7.CURRICULUM SUPPORT 8.SENSE OF FULFILLMENT 9.THE UPS 10.THE DOWNS 11.THE CHALLENGES 12.NEEDED SKILLS 13.CONCLUSION 3 In this paper, I…

CYSE 368 REFLECTION #3

Justin Saldivar Reflection Paper #3 Date: 04/18/2026 ODU Spring 2026 Virginia Air and Space Science Center Professor Teresa Duvall/TA Joshua Russell As my internship nearly comes to a close, I have begun looking back at the last couple of weeks in finer detail to broaden my scope of understanding around the fields that made the…

CYSE 368 REFLECTION #2

Justin Saldivar Reflection Paper #2 Date: 03/29/2026 ODU Spring 2026 Virginia Air and Space Science Center Professor Teresa Duvall/TA Joshua Russell The past month and a half in my internship at the VASSC has continued to teach me a lot on the myriad of STEM fields that made the museum possible in the first place…

CYSE 368 REFLECTION INTERVIEW

Interview with Lecturer Morshed Alam Lecturer for Old Dominion University February 17, 2026 Interviewed by: Justin Saldivar CYSE 368 Spring 2026 Professor Teresa Duvall TA Joshua Russell For this reflection paper, I have opted to interview Md. Morshed Alam. Originally joining the university in the fall of 2024 on ODU’s Norfolk campus. He helped in…

Journal #F Digital Forensics With The Social Sciences

After watching the video, I think the social sciences are closely tied to the realm of digital forensics because at the end of the day. They both ultimately involve people both perpetrator and victim, to be exact. As the job of a digital forensics investigator is to identify what caused or what happened to a…

Career paper

The choice of career I would like to cover is the Information Security Analyst, their primary job is to plan and implement security measures in the networks of their parent organization. These companies include standard computing companies, business and security firms, and consulting firms. Alongside this role, they can also be responsible for implementing active…

Journal #12 What have YOU done wrong?

I think the five most troublesome violations one could do are: recording VoIP calls without consent, collecting children’s information, sharing sensitive data about others to the internet, illegal searches, and using copyrighted images. The first three reasons are similar in their severity, as VoIP tapping means that confidentially has been broken, collecting children’s information can…

Journal #11 Data breach economic forms

Classical Economic theory, Laissez-fair, Parsimony, and Objectivity. For Classical economic theory and Laissez-fair for the document, they both involve the fact. That until actual harm was done to the civil rights of the individual, the leak was kept under wraps as the company had no legal need to inform due to the hands-off nature of…

Journal #10 Article Review

The article, titled “Social Cybersecurity: An Emerging National Security Requirement,” details how not only can conventional wars of material and attrition be fought, but also how the war for the mind can be fought as well. To elaborate, the document details various strategies and reasonings on how discourse can be sowed into an enemy nations…

Journal #9 Social Media Disorder Scale

After taking the Social Media Disorder scale test, I received a score of 1.0. After some thought, I think that the test is geared toward those who were given relatively loose rules when it came to internet access with little to no guidance when it came to normal usage of the internet. I think it…