ODU Logo

Alexander Gardner

Cybersecurity

Month October 2022

Journal Entry #5

Ranking motives Multiple Reasons: I think a combination of reasons is almost always the reason. A cocky offender could not only be doing it for them fame, but they also need the money and might just be bored. For Money:… Continue Reading →

Journal Entry #4

Maslow’s Hierarchy of Needs and My Experience to Technology At the very bottom of Maslow’s Hierarchy we find physiological needs. This includes things like food, water, and warmth. I find technology involved in this due to need for technology when… Continue Reading →

Journal Entry #3

How do researchers use information like PrivacyRights.org to study breaches? A scientist would you a website like this because they can view recent data breaches. Another pro to this website is that we can see registered data broker and the… Continue Reading →

Journal Entry #2

Explain how the Principles of Science Relate to Cybersecurity Relativism applies to cybersecurity due to the giant impact of cyber technology in our digital age. We can see how the more technology we as a society obtain the more cybercrime… Continue Reading →

Journal Entry #1

Are there certain areas of the NICE Workforce Framework that you would want to focus your career on? One thing that interested mean is cyber defense analysis. A cyber analysis uses defensive measures and information to identify, analyze, and report… Continue Reading →

Journal Entry #3

Describe four ethical issues that arise when storing electronic information about individuals One of the main ethical issues that arise when storing data about an individual is protecting the data. As technology continues to progress this becomes an even larger… Continue Reading →

Journal Entry #2

Select four other majors offered by ODU and explain how those majors relate to cybersecurity. Criminal Justice and cybersecurity are both tied together with a common goal in mind, to focus on preventing crime. Much like someone who may pursue… Continue Reading →

Article Review #1

Illegal Gambling and Its Operation via the Darknet and Bitcoin: an Application of Routine Activity Theory This article aims to contribute to criminology literature by applying the routine activity theory which states that crimes can occur when a suitable target,… Continue Reading →

© 2025 Alexander Gardner — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑