cyse200t

Nhu Nguyen

Module 7: Ethical and Political Philosophy of Cybersecurity

Journal 7: How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? The first thing that arises in mind to secure the company’s data to ensure its assets because today’s data is money,… Continue Reading →

Module 6:

Journal 6: 1. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? 2. How does cyber technology impact interactions between offenders and victims? The first thing that arises in mind is how to… Continue Reading →

Module 5: Computer Behaviors and Cybersecurity / Systems Security Engineering and Cyber Technology

Journal 5: 1. Describe three ways that computers have made the world safer and less safe. 2. How do engineers make cyber networks safer? In today’s society, almost every part of our day revolves around computers. I believe computers have… Continue Reading →

Module 4: Protecting Business Using Technology / Computer Security Incidents and Technology

Journal 4: 1. What are the costs and benefits of developing cybersecurity programs in business? 2. How can you tell if your computer is safe? Cybersecurity is one priority, particularly on just about everyone’s radar in some way, shape, or form for… Continue Reading →

Module3:

Journal 3: How has cyber technology created opportunities for workplace deviance? Workplace deviance is a deliberate, malicious attempt to sabotage an organization by causing problems within. Workplace deviance is seen frequently in the Cyber field. There are many reasons why… Continue Reading →

Module 3: ​Risk management and cybersecurity 

Free writing: Legal ways to make money in cybersecurity…. Create app that rates software. Yacht GPS software that is secure Building firewalls into network infrastructures for big company Establish small start up business in computer technology Rent out cybersecurity services … Continue Reading →

Module 2:

Journal 2: 1. Describe four ethical issues that arise when storing electronic information about individuals. 2. Compare cybersecurity risks in the U.S. and another country. Some of the ethical issues that arise when storing electronic information of individuals are:1. Inappropriate use of… Continue Reading →

Module 1: Free Writing

WHEN I GOOGLE MY NAME…. It is fortunate that when I googled my full name which is Nguyen Ngoc Quynh Nhu, I do not see information that related to myself specifically. The only specific information that perhaps has some types… Continue Reading →

About me

My name is Nhu Nguyen, but you can call me Sarah. I am a student at Old Dominion University and my major is biochemistry. Even though I am a scientist, I am also very interested in the evolution of technology… Continue Reading →

Module 1

Journal 1: The relationships between cybersecurity and other majors.  The relationship between science and cybersecurity seems to be very vague. Still, in reality, cybersecurity plays a significant role in researching and publishing a study in science. Specifically, my major is… Continue Reading →

© 2025 cyse200t — Powered by WordPress

Theme by Anders NorenUp ↑