ODU Logo

ben-Cybersecurity Portfolio

Ben E

Author beast001

Week 15 – Journal Entry 15

As part of their job, digital forensics detectives use behavioral analysis and know how people use computers, which is linked to the social sciences . You have to look for trends, reasons, and links in cybercrime, just like you do… Continue Reading →

Week 12 – Journal Entry 13

Some important parts of cybersecurity policy are bug bounty programs, which pay people to find holes in a company’s computer systems. The study of the literature shows that bug bounty programs can help improve cybersecurity by using the skills of… Continue Reading →

Journal Entry 12

The effects of a data leak are talked about in the breach notification letter. Some economic theories can be used to look at these effects. For example, Game Theory looks at how people play games strategically, and Behavioral Economics studies… Continue Reading →

Week 11 – Journal Entry 11

There are a number of social behaviors and topics that are mentioned in relation to the cybersecurity analyst job description in the video. Collaborating and communicating effectively is a common thread. Effective identification and mitigation of security threats frequently require… Continue Reading →

Week 11 – Journal Entry 10

based on the article, the piece stress Personal Accountability people are responsible for keeping cybersecurity in good shape. It stresses the importance of individual behavior in determining systemic safety, whether online or off. The article explains what “cyber hygiene” is… Continue Reading →

Week 10 – Journal Entry 9

According to the SMDS Scale, I scored 2 out of 9, which is lower than the minimum 5 out of 9. Therefore, based on these criteria, I would not receive a diagnosis of SMDS. The questions were honest and intimate,… Continue Reading →

fhkvb

ghkjhl

Week 6 – Journal Entry 6

Faked websites: A Scam: www.applestoretech.com Scammers frequently use claims of extremely low prices for Apple products to entice naive consumers, and this website is no exception.Since it differs from the domain of Apple’s official website, the domain name raises suspicions.  www.paypalloginsecure.com…. Continue Reading →

Journal entry 4

Maslow’s Hierarchy of Needs is a great way for me to look at my tech-filled life. Starting with Physiological Needs, technology makes it possible to use food delivery apps, which come in handy during busy study sessions. Safety Needs are… Continue Reading →

Week 3: Journal Entry

How might researchers use information PrivacyRights.org to study data breaches? Finding Trends: The Data Breach Chronology can help researchers find patterns and trends in data leaks. This includes the industries that are most at risk, the most common ways that they are… Continue Reading →

« Older posts

© 2025 ben-Cybersecurity Portfolio — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑