One of the things I love about Linux is how predictable it becomes once you understand the layers: storage, permissions, services, and networking. Every piece is visible, configurable, and scriptable. So when I decided to build a personal media server, Jellyfin was the perfect project to tie those layers together – a real‑world example of…
A Linux Script for quick R-sync
A close friend and coworker of mine had a school laptop she ended up accidentally shattering the screen on. Being that it was a budget laptop I opted not to replace the screen in it but still felt it shouldn’t be sent to the dumpster as she intended. After some hilarious flexing of the screen…
Protections for Covered Entities under HIPAA
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule establishes a national set of minimum security standards for protecting all electronic private health information (ePHI) that a Covered Entity (CE) and Business Associate (BA) create, receive, maintain, or transmit. The Security Rule contains the administrative, physical, and technical safeguards that CEs and BAs must…
Why victims of cybercrime dont always report
There are many prominent reasons why victims of cybercrime fail to report to authorities when they are pursued by an online criminal, such as digital fatigue brought on by having so many accounts, decreased perception in the harm that was done, a lack of trust in law enforcement where some victims believe it is pointless…
The Role of Social Science Principles in the Information Security Field.
Casey Jones CYSE 201S Old Dominion University October 24, 2026 Professionals within the Information Security Industry including penetration testers, ethical or white hat hackers, infosec analysts, and others involved in protecting technology while administering services, would benefit greatly from understanding the psychology of the adversaries who would threaten those vary systems. “To know your enemy,…
Client-Side Scanning and the Infringement of Privacy it causes
Once limited to military and intelligence agencies, cryptographic tools became widely available with the invention of the PC around the turn of the 20th century, providing a means for users to encrypt and secure their private data and communications. This was met with intense resistance from Law Enforcement officials who believed it served to hinder…
Response to Human Firewall – TED Talks
After watching Rob May’s talk on the Human Firewall, I felt several topics he discussed resonated with core values and thoughts I have had before. It is quite intimidating when a stranger confronts you in public with information about you that is factually accurate. It immediately invokes a heightened sense of alertness and represents what…
Key points in developing an information systems security policy
When developing an information security system policy to protect digital infrastructure within an entity, several key points must be addressed to form a solid framework that can be built upon and expanded as needed to address future threats and changing technologies. The document should clearly define the information security objectives, scope of technology the policy…
A review of Cyberattacks, Cyber Threats, and Attitude Towards Cybersecurity Policy.
Public and legislative demand for stronger cybersecurity policies have become increasingly heard, especially after some high–profile events such as the Colonial Pipeline and SolarWinds breaches in 2021 (Snider et al. 2021). These breaches were believed to have been possible due to a lack of information availability from the government to cybersecurity professionals managing critical infrastructure,…
The Equifax data breach of 2017
Casey Jones, Old Dominion University September 3, 2025 The Equifax data breach of 2017 is significant due to the large amount of people affected by the illegal heist which secretly stole their sensitive personal and financial information over the course of several months before it was discovered in late July of 2017. This attack was…