ODU Logo

CYSE 201S

Aria Grant

Category Journal Entry

Journal Entry #11

Cybersecurity analysts jobs are very closely intertwined with social behaviors. Communication is a necessity and a cybersecurity analyst could not do their job without communication. Additionally, cooperation is key. Without all of its parts, a machine cannot run properly, the… Continue Reading →

Journal Entry #10

The article focuses on the changing aspect of warfare and how social cybersecurity has transformed from an unknown to the centerpiece of information safeguarding. The article correctly points out that cyberwarfare is becoming increasingly more common, while physical warfare is… Continue Reading →

Journal Entry #9

After watching the video and scoring myself, I would have a two out of nine score, or less than that for what would be considered ‘disordered social media user.’ The items within the scale would be what I would consider… Continue Reading →

Journal Entry #8

After watching the video, I can say that the media has a decent base of understanding about cybersecurity. While almost all clips contained flaws, many were at least believable to a certain point. Common faults seemed to be programs, code,… Continue Reading →

Journal Entry #6

Fake websites are designed to pass with mostly a quick glance and not looking deeper into the site. The first way to tell if a site is fake is to read the page. Many fake websites will have spelling and… Continue Reading →

Journal Entry #5

Motives for cybercrime can vary wildly per person and case. Out of the seven multiple reasons is the most reasonable, as there is hardly ever one sole reason for anything in life. The second most reasonable is political, as we… Continue Reading →

Journal Entry #3

Researchers could get a great deal of information from PrivacyRights.org. For studying data breaches, this site would allow them to catalog breaches since the site’s creation. With this, larger trends can become clearer as time passes and how they change… Continue Reading →

Journal Entry #4

Maslow’s hierarchy of needs sets a precedent for what each individual needs to survive and be happy. The first layer, physiological needs, can be completed with modern technology in hospitals such as ventilators. The second layer, safety and security, is… Continue Reading →

Journal Entry #2

The principles of science relate heavily to cybersecurity as a whole. Relativism states that all things are related which can be emphasized by the growing necessity of technology within schools, the government, or even our daily lives. Objectivity states that… Continue Reading →

Journal Entry #1

The area in which I would like to focus my career on would be Data Administration. I enjoy the explanation of Data Administration because of the focus on protection and availability of data. It dictates where data is needed, how… Continue Reading →

© 2025 CYSE 201S — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑