ODU Logo

alovo001cyse201s

Student Name

Category Uncategorized

Week 13 – Journal Entry 14

1.) Using unofficial streaming services is a big one for me as accessing movies, shows and or music through illegal websites is a huge risk to not only your device but you yourself as data can be stolen fast and… Continue Reading →

Week 12 – Journal Entry 13

the article on bug bounty policies explains how these programs are becoming more and more popular and cost-effective strategies for Improving cybersecurity. The literature review discusses how ethical hackers are paid and incentivized to find system vulnerabilities before they can… Continue Reading →

Week 12 – Journal Entry 12

This breach letter highlighted how data breach affects both businesses and their customers. In economic terms, cost-benefit analysis helps businesses with the value of cybersecurity investments against the potential loss financially that could occur from a breach. Another relevant theory… Continue Reading →

Week 11 – Journal Entry 10

This article emphasized the importance of social cybersecurity in the new age of technology. It focuses on how attacks have been growing rapidly using social engineering and exploiting human behavior and societal issues such as misinformation. Unlike tradition cybersecurity, which… Continue Reading →

Week 10 – Journal Entry 9

I scored 3 yes’s and was indicated as risky usage. I think that the items on the scale don’t relate to my use of social media that much because i mainly use it for entertainment as opposed to myself posting… Continue Reading →

Week 8 – Journal Entry 8

The media has a big influence in how we as the audience view cybersecurity. Media often distorts or exaggerates things for the sake of entertainment such as hackers having incredible sense of ease when hacking and being able to break… Continue Reading →

Week 7 – Journal Entry 7

For photo 2, I chose to write a meme for it saying ” trying to explain to your team why not using “Password123″ is more important than actual cybersecurity,”  as this emphasizes the importance of good practice in creating strong… Continue Reading →

Week 6 – Journal Entry 6

Identifying fake websites is crucial to protecting personal information as counterfeit websites often use fake URL’s impersonating legitimate websites such as apple as they offer unrealistic discounts and promise up to 90% off products which is not common on the… Continue Reading →

Week 5 – Journal Entry 5

1.) for money makes the most sense as financial gain is a common driving motive behind cybercrimes such as fraud and hacking 2.) revenge is a strong motive as this can be in cases such as cyber bullying where one… Continue Reading →

Week 4 – Journal Entry 4

Technology plays a key role in meeting and fulfilling our everyday needs. We used apps to order important items such as food or track health and fitness for basic necessities. Safety is a vital element of technology as antivirus software… Continue Reading →

« Older posts

© 2025 alovo001cyse201s — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑