{"id":65,"date":"2025-04-22T02:49:42","date_gmt":"2025-04-22T02:49:42","guid":{"rendered":"http:\/\/totesa.website\/student\/?page_id=65"},"modified":"2025-04-24T02:50:10","modified_gmt":"2025-04-24T02:50:10","slug":"general-education","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ccarr035\/academics\/general-education\/","title":{"rendered":"Investigation and Cybercriminology"},"content":{"rendered":"\n<p>1.Cybercrime Media Assignment<\/p>\n\n\n\n<p>In this lab activity, I was tasked to critically examine how cybercrimes are handled from both legal and media perspectives. It involved two main components: analyzing an affidavit for a search warrant and evaluating media coverage of the case. This lab helped me bridge the gap between legal documentation and public reporting, emphasizing the role of media in shaping public understanding of cybercrime cases.<\/p>\n\n\n\n<p>2.Exploring Risky Behavior Assignment<\/p>\n\n\n\n<p>This assignment involved in real-world observation of behaviors in a gym setting and identifying vulnerabilities that could lead to a cybercrime or digital victimization. Each scenario that I listed, highlighted a specific security risk, the associated cyber offense, theoretical explanations, and suggested solutions.<\/p>\n\n\n\n<p>3.Open Source Intelligence Assignment<\/p>\n\n\n\n<p>In this assignment, I used OSINT investigation skills by selecting a real person and answering a series of questions about them using publicly available tools and data.<\/p>\n\n\n\n<p>Artifact 1<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-content\/uploads\/sites\/38976\/2025\/04\/Cybercrime_media.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Cybercrime_media.\"><\/object><a id=\"wp-block-file--media-9f304006-3a93-49b6-a0c3-4a7f9a2e1490\" href=\"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-content\/uploads\/sites\/38976\/2025\/04\/Cybercrime_media.pdf\">Cybercrime_media<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-content\/uploads\/sites\/38976\/2025\/04\/Cybercrime_media.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9f304006-3a93-49b6-a0c3-4a7f9a2e1490\">Download<\/a><\/div>\n\n\n\n<p>Artifact 2<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-content\/uploads\/sites\/38976\/2025\/04\/Exploring_Risky_Behavior-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Exploring_Risky_Behavior-1.\"><\/object><a id=\"wp-block-file--media-a38c6ae4-6b3c-46b7-9a82-1459139b35e0\" href=\"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-content\/uploads\/sites\/38976\/2025\/04\/Exploring_Risky_Behavior-1.pdf\">Exploring_Risky_Behavior-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-content\/uploads\/sites\/38976\/2025\/04\/Exploring_Risky_Behavior-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a38c6ae4-6b3c-46b7-9a82-1459139b35e0\">Download<\/a><\/div>\n\n\n\n<p>Artifact 3<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-content\/uploads\/sites\/38976\/2025\/04\/Open_source_INTEL.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Open_source_INTEL.\"><\/object><a id=\"wp-block-file--media-30855ecc-cc21-42de-a7c3-245a755708c4\" href=\"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-content\/uploads\/sites\/38976\/2025\/04\/Open_source_INTEL.pdf\">Open_source_INTEL<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-content\/uploads\/sites\/38976\/2025\/04\/Open_source_INTEL.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-30855ecc-cc21-42de-a7c3-245a755708c4\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>1.Cybercrime Media Assignment In this lab activity, I was tasked to critically examine how cybercrimes are handled from both legal and media perspectives. It involved two main components: analyzing an affidavit for a search warrant and evaluating media coverage of&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/ccarr035\/academics\/general-education\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":24947,"featured_media":0,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-json\/wp\/v2\/pages\/65"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-json\/wp\/v2\/users\/24947"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-json\/wp\/v2\/comments?post=65"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-json\/wp\/v2\/pages\/65\/revisions"}],"predecessor-version":[{"id":288,"href":"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-json\/wp\/v2\/pages\/65\/revisions\/288"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-json\/wp\/v2\/pages\/33"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ccarr035\/wp-json\/wp\/v2\/media?parent=65"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}