ODU Logo

cturn029cyse201s

Student Name

Journal 14 – Illegal Internet Things

People always complain about torrenting and not enough about capitalistic exploitation. But that’s not what the journal prompt is. I’m just saying, I understand why people torrent and download stuff off of YouTube. Not that I’m saying I have ever… Continue Reading →

Journal 13 – Bug Bounties

HackerOne wishes to establish an organization who charges a “bounty” to catch certain “bugs” or glitches within code bases of marketed programs. They would work similarly to a gray hat hacking function in which people attempt to hack into organization’s… Continue Reading →

Journal 12 – Sample Data Breach Notification

I think the laissez-faire economic theory was thought of because business barons didn’t like dealing with bureaucracy. Only keeping the laws that protect individuals doesn’t make sense when the whole infrastructure is left vulnerable. There’s a point in keeping all… Continue Reading →

Journal 11 – Cybersecurity Analyst

This video is very informative about how and where to work in cybersecurity. I like how she discusses the cost of living in each city and how much you can earn. She discusses the recommended credentials to get in order… Continue Reading →

Journal 10 – Social Cybersecurity

Social cybersecurity is vital to militaries who specialize in combating cybercrime. It is a computational science field that gathers archival digital data and electronic records to identify when and where a cybercrime might have occurred.

Journal 8 – Social Media Disorder

I’m honestly not popular enough on social media for it to be addictive. I also don’t see the wisdom in sharing pictures of my personal life. I’m careful not to mention actual names or places when I’m blogging or telling… Continue Reading →

Journal 7 – Memes

Created this one for people who upload every facet of their lives to Facebook, even their children and what their house looks like. I made it like an advertisement. It’s about how your devices shouldn’t be unprotected when connected to… Continue Reading →

Journal 5 – Ranking Motivations For Cybercrime

Journal 4 – Maslow’s Hierarchy of Needs

My experience with technology as it pertains to the hierarchy of needs can be summed up by examining each layer of the pyramid from the bottom up:

Journal 3 – Privacy Rights

I find the Data Breach Chronology section of privacyrights.org fascinating. You can also download the data for $450. Uh, don’t think I’m going to invest, sorry. There’s also a section of news stories under Advocacy where you can see the… Continue Reading →

« Older posts

© 2025 cturn029cyse201s — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑