Meme: When your boss finally gives you a five cent raise for tirelessly defending his company from cyber-attacks daily. This is the main security professional that works at the company. He is the first line of defense within the company, who does all the training and creating the programs and firewalls to keep the company…
Author: cwhit113
Journal #6
Spotting fake websites. The three that were spotted were a PNC banking app, Amazon, and the myODU. First, the PNC banking app seemed normal until a popup happened and asked to update all personal information. Once the popup was clicked it took you to another page where the web address looked weird, and when further…
Cybercrime Victimization (Article Review #1)
Cameron White, Feb. 11, 2024 Introduction This article review will be about how interpersonal cybercrime effect people on the internet and in the metaverse. Interpersonal cybercrime is defined as “any act of criminal activity in cyberspace by an offender against another individual through digital interaction and communication, whether they have a legitimate or imaginary relationship”…
Journal #5 (free write)
Create a program that filters junk mail Yacht secure GPS software Build an application to make more secure passwords Educating people on cybersecurity Reduce the risk of a cyber-attack for a company by implementing a security plan Securing wireless network devices Engineering a secure network for a company Create and application to…
Journal #5
Out of the seven motives given I believe the one that makes the most sense or that is the biggest motivator for people is “multiple reasons”, followed by money, political views, revenge, entertainment, recognition, and lastly boredom. The reason I believe “multiple reasons” is first is because not many people do something, especially a…
Journal #4
In the United States we have some of the best protections for when it comes to cyber-attacks. However, a lot of other countries do not have this luxury whether it be from invasions of privacy from their own government or from unreliable research and funding into cybersecurity. On the extreme end of government invasion of…
Journal #4
Maslow’s hierarchy of needs describes the hierarchical nature of human’s. The hierarchy is a pyramid with five levels, form the most basic to more complex needs at the top. The five levels withing it are are physiological needs which is things needed for human survival, safety needs, love and belongingness needs, Esteem needs, self-actualization need…
Journal #3
There are a few ethical issues you could talk about when storing electronic information about individuals. What I would say are the most prevalent is privacy concerns, data breaches, and information not being up to date. First, privacy concerns are the biggest risk when keeping personal information electronically. Putting your information into websites that are…
Journal #3
There are a few ethical issues you could talk about when storing electronic information about individuals. What I would say are the most prevalent is privacy concerns, data breaches, and information not being up to date. First, privacy concerns are the biggest risk when keeping personal information electronically. Putting your information into websites that are…
Cameron White
Hello, my name is Cameron White, and I am a sophomore studying Cyber Security here at Old Dominion University. Some of my hobbies include playing sports such as soccer, football, and tennis. As well as video games, and hanging out with my friends. I am in a Fraternity on campus here called Sigma Phi Epsilon,…