ODU Logo

Portfolio

Dominique Taylor

Author dtayl043

Article Review #2

Cyberattacks do not get the publicization they truly deserve and the public truly does notunderstand the severity of them until it happen to them and it’s too late. This article made greatpoints regarding cyberattacks, threats, and necessary support regarding cyber… Continue Reading →

Article Review #1

Cybersecurity is very complex and is a major topic in corporations to ensure they have efficient teams and stakeholders who are familiar with the field making quick critical decisions on behalf of the company. The article “Executive Decision-makers: A Scenario-based… Continue Reading →

entry #5

Most cyber-attacks have some type of motive that drives them to pursue the attack, so ranking the motives from what makes the most sense to which makes the least. Starting at #1 I would choose political motives. This motive makes… Continue Reading →

entry #6

Fake websites also known as phishing have been seen a lot more frequently in emails but there are many ways to spot if it is real or not. Walmart have been a corporation that has been victim to phishers making… Continue Reading →

Career Paper

. “Cybersecurity careers and social science” By Dominique Taylor. Cybersecurity is a growing field that relies on many things to provide information so that it can grow and do its job effectively. One main assistant is social science due to… Continue Reading →

Journal entry 15

Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career…. Continue Reading →

journal 12 entry 14

. Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. The article “11 Illegal Things… Continue Reading →

journal entry 12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf Links to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. This sample breach letter doesn’t provide much information… Continue Reading →

journal entry 11

watch this video https://www.youtube.com/watch?v=iYtmuHbhmS0  think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation. A cyber analyst is a very interesting job and is the… Continue Reading →

Journal entry 10

Read this and write a journal entry summarizing your response to the article on social cybersecurity  https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site. This article was very interesting in regard to seeing how the evolution of warfare has changed so drastically due… Continue Reading →

« Older posts

© 2025 Portfolio — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑