ODU Logo

cyse201s202320spr24

Camillia Epps

Week 15 Journal Entry 15

Sticky post

Think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. Looking at this video and him explaining his career shows how… Continue Reading →

Week 13 Journal Entry 14

Sticky post

Andriy Slynchuk .has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. First, streaming copyrighted content… Continue Reading →

Week 12 Journal Entry 13

Sticky post

A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. … Continue Reading →

Week 12 Journal Entry 12

Sticky post

Read this sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. Looking at the breach notification letter for two economic theories I choose: Looking at… Continue Reading →

Week 11 Journal Entry 11

Sticky post

Think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation. As shown in the video, the job of the cybersecurity analyst connects with various social… Continue Reading →

Week 11 Journal Entry 10

Sticky post

Read this and write a journal entry summarizing your response to the article on social cybersecurity. The article looks at the growing importance of social cybersecurity within national security. It is showing the manipulation of human behavior and social dynamics… Continue Reading →

Week 10 Journal Entry 9

Sticky post

Complete the Social Media Disorder scale to an external site.  How did you score?  What do you think about the items in the scale?  Why do you think that different patterns are found across the world? Accordingto DSM, at least five… Continue Reading →

Week 8 Journal Entry 8

Sticky post

After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. From watching the video, I can say that from what she explains and breaks down. The media can be informative in… Continue Reading →

Week 7 Journal Entry 7

Sticky post

Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s). Explain how your memes relate to Human-centered cybersecurity. This meme relates to human-centered cybersecurity due to it is showing what appears to… Continue Reading →

Week 6 Journal Entry 6

Sticky post

Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? What makes the fake websites fake? Making sure that you know a real website versus a… Continue Reading →

Week 5 Journal Entry 5

Sticky post

Review the articles linked with each individual motive in the presentation page or slide #4.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). … Continue Reading →

Week 4 Journal Entry 4

Sticky post

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. In this post I will explain how I relate to… Continue Reading →

Week 3 Journal Entry 3

Sticky post

Privacy Rights- How might researchers use this information to study breaches? How researchers may use this information is to study it. When they study it and look and see what, how, why and when these breaches happened, they can make what… Continue Reading →

Week 2- Journal Entry 2

Sticky post

In order to understand cybersecurity and the things that come into play for cybersecurity, maybe cyber-attacks and threats that could arise. You can use the principles to help assess and review what to do next. If you were to use… Continue Reading →

Week 1 – Journal Entry

Sticky post

Oversee and Govern I chose this area due to the fact that the list of options that they had felt as if they fit me best. the area that appeals to me inside of the category for specialty area starting… Continue Reading →

« Older posts

© 2025 cyse201s202320spr24 — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑