ODU Logo

CYSE EPORTFOLIO

Prescott Kowalski

CYSE 201S Week 3 Journal Entry

Week 3 Journal Entry Publicly available information about data breaches includes breach notifications, government reports, industry analyzes, and media coverage. Researchers can use this information to study patterns and trends in data breaches, identify common vulnerabilities, and evaluate the effectiveness… Continue Reading →

CYSE 201S Week 2 Journal Entry

Week Two Journal Entry 1. Determinism Behavior is caused, determined, or influenced by preceding events. In cybersecurity, determinism manifests in understanding that every cyber incident has a cause rooted in prior events. For example, a data breach doesn’t occur randomly;… Continue Reading →

CYSE 201S Week One Journal Entry

Week one Journal Entry Psychology, Sociology, Criminology are the top three careers I would consider. I would study Psychology for the broad aspect of how the human mind works, figuring more out about it every day. Sociology for the study… Continue Reading →

CYSE 200S Journal Entry 15

Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. Davin Teo’s journey into digital forensics is… Continue Reading →

CYSE 200S Week 13 Journal Entry 14

Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. In my opinion, the… Continue Reading →

CYSE 200S Journal Entry, 13

Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true Links to an external site.  and write a summary reaction to the use of the policies in your journal.  Focus primarily on the literature review and the discussion of the findings. Bug bounty programs are a… Continue Reading →

CYSE 200S Week 12 Journal Entry, 12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf Links to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. Social Science Theories Labeling Theory Structuralism Economics Theories

CYSE 201S Week 11 Journal Entry 11

Think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation. The role of a cybersecurity analyst frequently emphasizes the connection between technology and human behavior…. Continue Reading →

CYSE 201S Week 11 Journal Entry 10

The article “Social Cybersecurity: An Emerging National Security Requirement” by Lt. Col. David M. Beskow and Kathleen M. Carley delves into the idea of social cybersecurity as an essential aspect of national security. It underscores the growing impact of cyber-driven… Continue Reading →

Week 6 Journal Entry CYSE 200T

Should healthcare systems and hospitals be forced to follow cybersecurity standards? Do you agree that fines are needed to incentivize compliance? I honestly believe they should. Given the sensitive nature of patient data and the potential consequences of a breach,… Continue Reading →

« Older posts

© 2025 CYSE EPORTFOLIO — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑