ODU Logo

CYSE201

Chris Heckman

Page 2 of 2

Week 6 – Journal Entry

Genuine websites often exhibit polished designs with consistent color schemes and well-aligned elements. They prioritize secure connections, indicated by the presence of ‘https://’ and a padlock icon in the address bar, to safeguard user data. Legitimate sites also provide clear… Continue Reading →

Week 5 – Journal Entry

My ranking is based on the perceived impact, prevalence, and strategic nature of each motive, considering the diverse and evolving landscape of cybercrime.

Article Review #1

Article Review: Tackling APTs and Cybersecurity Vulnerabilities Chris HeckmanOld Dominion UniversityCYSE 201Mr. Aslan2/5/2024 Introduction The integrity, confidentiality, and availability of the organizational data and services by advanced persistent threats (APTs) and the use of sophisticated cybersecurity vulnerability exploitation is a… Continue Reading →

CYSE 201S

About me

Hello, my name is Chris and I am the author of this page. A few things about me I enjoy are coding, playing games, and working out. Currently enrolled at ODU in pursuit of my Bachelor’s in Cyber Security.

Week 4 – Journal Entry

Maslow’s Hierarchy of Needs outlines five levels of human needs, from basic survival to self-actualization. In terms of technology, the physiological level is met through access to digital resources for sustenance and healthcare information (online conversations/websites full of information). Safety… Continue Reading →

Week 3 – Journal Entry

Researchers can leverage information from PrivacyRights.org on publicly available data breaches to conduct comprehensive studies. Analyzing the types of compromised information, affected entities, and patterns can provide insights into common vulnerabilities. Researchers may identify trends, assess the effectiveness of security… Continue Reading →

Week 2 – Journal Entry

The principles of science play an important role in cybersecurity by providing a systematic and empirical approach to understanding, analyzing, and securing digital systems. Just as scientific methods involve observation, experimentation, and evidence-based reasoning, cybersecurity relies on continuous monitoring, threat… Continue Reading →

Week 1 – Journal Entry

Sticky post

Within the NICE Workforce Framework, the analysis and investigation careers hold a particular allure for me with their dynamic and intellectually stimulating nature. Roles such as Cyber Threat Analyst or Digital Forensics Analyst allow for continuous problem-solving, requiring a keen… Continue Reading →

Hello World!

This is a post. Use posts to update your blog.

Newer posts »

© 2025 CYSE201 — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑