ODU Logo

CYSE EPORTFOLIO

Prescott Kowalski

CYSE 200S Week 13 Journal Entry 14

Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. In my opinion, the… Continue Reading →

CYSE 200S Journal Entry, 13

Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true Links to an external site.  and write a summary reaction to the use of the policies in your journal.  Focus primarily on the literature review and the discussion of the findings. Bug bounty programs are a… Continue Reading →

CYSE 200S Week 12 Journal Entry, 12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf Links to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. Social Science Theories Labeling Theory Structuralism Economics Theories

CYSE 201S Week 11 Journal Entry 11

Think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation. The role of a cybersecurity analyst frequently emphasizes the connection between technology and human behavior…. Continue Reading →

CYSE 201S Week 11 Journal Entry 10

The article “Social Cybersecurity: An Emerging National Security Requirement” by Lt. Col. David M. Beskow and Kathleen M. Carley delves into the idea of social cybersecurity as an essential aspect of national security. It underscores the growing impact of cyber-driven… Continue Reading →

Week 6 Journal Entry CYSE 200T

Should healthcare systems and hospitals be forced to follow cybersecurity standards? Do you agree that fines are needed to incentivize compliance? I honestly believe they should. Given the sensitive nature of patient data and the potential consequences of a breach,… Continue Reading →

Week 4 CYSE 200T Journal Entry

The Framework for Improving Critical Infrastructure Cybersecurity, developed by NIST, is a set of guidelines aimed at helping organizations manage cybersecurity risks effectively. Version 1.1 builds on the original framework by providing new tools and enhancements to address emerging challenges… Continue Reading →

CSYE201S Week 10 Journal Entry

I scored a 9/9 on the https://www.brieftherapyconference.com/download/handouts/Tobi-Goldfus-Social-Media-Disorder-Scale.pdf I completely agree with the items on the quiz. I believe around the world the scores will be different as they don’t have as much access, but in most countries with access I… Continue Reading →

Week 10 CYSE200T Journal Entry

Should governments and private companies be allowed to scan public and private social media sites, messaging apps, etc for suspicious content in the name of safety?  Yes, I truly believe they should be able to, within reason. I believe that,… Continue Reading →

Week 8 Journal Entry CYSE 201S

The media significantly shapes our understanding of cybersecurity. News frequently emphasizes dramatic incidents like data breaches and hacking, raising awareness but often oversimplifying complex issues. Movies and TV shows, while entertaining, present hackers as either geniuses or villains, perpetuating stereotypes…. Continue Reading →

« Older posts

© 2025 CYSE EPORTFOLIO — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑