ODU Logo

cyse201s-dsasa001

Dante Sasaki

Category Journal Entries

Week 15 – Journal Entry 15

Digital forensics can be considered a part of social sciences because it talks about the societal impacts that people’s crimes have on people and how digital forensics can help prevent or understand the motives behind the people that are causing… Continue Reading →

Week 12 – Journal Entry 14

Week 11 – Journal Entry 13

Bug bounty policies are an important technique in modern cybersecurity practices. This is because these practices incentivize people called white-hat hackers which are ethical hackers who try to identify vulnerabilities for companies and their main purpose is to help advance… Continue Reading →

Week 11 – Journal Entry 12

2 economic theories that relate to the letter are Cost-Benefit Analysis (CBA) and Moral Hazard. CBA is related because it is the company’s response to the breach which involves offering help with credit card replacement and recommending customers to look… Continue Reading →

Week 10 – Journal Entry 11

I learned that the cybersecurity analyst can make a lot more money as an entry job if you have the time to do a graveyard shift. Most of the work that you do as a cybersecurity analyst is safeguarding technological… Continue Reading →

Week 10 – Journal Entry 10

The article mainly talks about how threats between countries using their military is taking a slight shift towards technological advantages. They are changing from physical battles when people are on a field and more towards fake news and social cybersecurity…. Continue Reading →

Week 9 – Journal Entry 9

I scored a 2 out of 9 mainly because I only use social media when I am bored and have nothing to do. I prefer to hang out with my friends and stay away from my phone if I can…. Continue Reading →

Week 8 – Journal Entry 8

One way that movies make hackers appear is that they are actual geniuses. Any real hacker takes actual time to get into systems and it is not a quick and easy process where they usually get into systems within seconds… Continue Reading →

Week 7 -Journal Entry 7

Picture isn’t letting me transfer it to this document This is Human-centered cybersecurity because I(a human) am working on anassignment online and sometimes you have to worry about other outside issues. Someoutside issues could be getting redirected on other websites… Continue Reading →

Week 6 – Journal Entry 6

fake websites include websites that are phishing, fake online stores, and clone websites. clone websites can be harmful like when someone wants to give you something on steam and needs you to login to your official account when it is… Continue Reading →

« Older posts

© 2025 cyse201s-dsasa001 — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑