ODU Logo

CYSE 201S Portfolio

Carter Guishard

Category Journal Entries

These are my journal entries consisting of essays, pictures and videos.

Path to Digital Forensics

In a TEDTalk presentation, a man by the name of Davin Teo, is a Digital Forensic Specialist, which is someone who retrieves data from a cyber incident and analyzes the data to collect clues about the perpetrator and the crime… Continue Reading →

Online Violations

An internet blog has described 11 illegal things you could do on the internet. While there are obviously more things you could illegally do, these are among the worst. However, I have my own top 5 ranking from least serious… Continue Reading →

Data Breach letter

In this data breach letter, a company got hacked and immediately notified the customer about this in hopes to notify the person so they can check their account before they are targeted next. Immediately, this comes off as relatable to… Continue Reading →

Cyber Analysts

Cyber analysts are people who work in cyber networking and infrastructure. These are people who must understand how malware works, and how cybercriminals think in order to anticipate attacks and thwart hacking attempts. This is similar to a digital forensic… Continue Reading →

Social Media Disorder Scale

The Social Media Disorder scale is a survey taken in order to determine the kind of social media user you are. A specific score of 5 or higher may indicate that you may have a disorder based on social media… Continue Reading →

Hacking in media

After watching the video shown, It has definitely dawned upon me once again that hackers in media are displayed MUCH differently than they are in reality. They are mostly seen as these neon green and cyan clad, futuristic geniuses that… Continue Reading →

Human Systems Integration meme

I feel as if this meme encapsulates the notion behind what HSI really is. Simply put, Human Systems Integration is the development of computers with human limitations taken into consideration. The knowledge based on human limitation is applied to the… Continue Reading →

Real vs Fake sites

While there are unfortunately a large number of people who will unknowingly click on obvious malicious links from shady sources, there is a much larger number that will click the link and enter in their info if the source looks… Continue Reading →

Ranking of Crime motives

Cybercrime is a very popular avenue of perpetration, with hacking being devastatingly effective in its usage. However everyone does not share the same motives. Below is my ranking for how much sense each motive makes, in terms of hacking(not that… Continue Reading →

Cyber Hierarchy of needs

Maslow has comprised a 5-tier hierarchy of human needs as one of his iconic contributions to psychology. From top to bottom, it begins with Self Actualization, where one desires to become the best version of themselves. Next is Self-Esteem, as… Continue Reading →

« Older posts

© 2025 CYSE 201S Portfolio — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑