ODU Logo

aladj redwood

Student Name

Category Uncategorized

Watch this video and pay attention to the way that movies distort hackers.

After watching the video about how movies and TV distort hacking, I realize the significant impact media has on our understanding of cybersecurity. Films often portray hackers as lone geniuses with magical abilities, effortlessly bypassing complex systems in seconds. This… Continue Reading →

Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).

Meme 1: “The Overwhelmed User” Image Concept: A person staring at a computer with a confused expression, surrounded by security alerts and notifications. Text:Top: “When you receive 10 security alerts in one day…”Bottom: “Is it a breach or just my… Continue Reading →

Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?

Fake Website: amazoan.comReal Website: amazon.comDifference: The misspelled URL can easily trick users, but the genuine site uses a secure HTTPS connection and has a recognizable logo. Fake Website: paypai.comReal Website: paypal.comDifference: The fake site may look similar but typically lacks… Continue Reading →

Review the articles linked with each individual motive in the presentation page or Slide #4.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it.

This ranking reflects the varying levels of impact and clarity associated with each motive in the context of cybercrime. 4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

Each level of need demonstrates how technology not only facilitates basic survival but also enriches my social and personal development

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?

Researchers can utilize the information from PrivacyRights.org about data breaches to analyze trends and patterns in cybersecurity incidents. By examining the types of data compromised, the industries affected, and the methods of breach, researchers can identify common vulnerabilities and assess… Continue Reading →

About Me

I am a dedicated student with a passion for cybersecurity, currently pursuing my degree at Old dominion university. Alongside my academic pursuits, I actively engage in extracurricular activities such as playing the game with my friends and people online where… Continue Reading →

Explain how the principles of science relate to cybersecurity.

Science and cybersecurity are closely intertwined, with several scientific principles and methodologies playing a crucial role in the development and implementation of cybersecurity measures. In summary, the principles of science provide the foundation for many of the methodologies and techniques… Continue Reading →

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

Security Operations: This area focuses on monitoring, detecting, and responding to security incidents in real time. It involves tasks like threat hunting, incident response, and security monitoring. What’s appealing here is the dynamic nature of the work—constantly adapting to new threats… Continue Reading →

Newer posts »

© 2025 aladj redwood — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑