ODU Logo

Deja Brown

welcome to my site

Author dbrow021

Journal entry 15

Journal entry 15 Deja Brown Watching Davin Teo talk about his career was interesting. He highlighted how much digital forensics relies on understanding people and not just technology. Digital forensics investigators do a lot. They analyze patterns, remake events, and… Continue Reading →

journal entry 14

Journal Entry 14 Deja Brown After reviewing all the things the author listed, I’ve chosen these 5 violations I feel are the most serious. Starting with illegal searches on the internet. I believe this is very serious because some searches… Continue Reading →

journal entry 4

Journal 4  Maslow’s hierarchy of needs are physiological needs, safety needs, love/ belongingness needs, esteem needs, and self-actualization needs. Each of those needs can relate back to technology somehow. Physiological needs are the needs such as food,water, and sleep. I… Continue Reading →

Journal entry 13

Journal Entry 13 Deja Brown In the literature review of the article on bug bounty policies, a lot of key things are highlighted. The concepts of bug bounty programs are examined, showing how they motivated ethical hackers to. Identify and… Continue Reading →

journal entry 12

Journal Entry 12 Deja Brown Economic and social theories relate to the data breach letter. These theories help form the Broader implications of data breaches beyond financial losses, reputation,and the societal impacts of corporate actions. Economic theories: Social Science Theories:

journal entry 11

Journal 11 Deja Brown This analyst role ties into social themes, especially around the way individuals and organizations interact online. Analyst have to understand the human factors that can make systems vulnerable. Social engineering, phishing, and misinformation are ways attackers… Continue Reading →

Journal entry 10

Journal #10 Deja Brown The article on social cybersecurity highlights the importance of addressing cybersecurity as a societal issue as well a technical one. It shows that cyber threats can exploit social behaviors and n weaknesses. That which requires more… Continue Reading →

Journal entry 9

Journal Entry 9 Deja Brown I only said yes for 2 out of the 8 questions on that scale. I feel as if you answer yes to a lot of those. It’s time to take a break from the social… Continue Reading →

Journal entry 8

Journal Entry #8 Deja Brown  I think the media influences our view on cybersecurity by making a lot of the things happen so quickly and easily in movies. The media influenced me in a good way to want to learn… Continue Reading →

Journal entry 5

Journal #5  Deja Brown (On my slides on my IPad I can only see 1-6 motives) In class we learned about different motives. Motives depend upon the crimes committed. My ranking is below:

« Older posts

© 2025 Deja Brown — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑