ODU Logo

My Cyber Security Journey

Danielle K.

Author dkenn010

Cybersecurity Memes

“Another awareness training…” Organizations should implement frequent human factors trainings to shape and mold your associate attitudes towards cybersecurity and the human impact on cyberattacks. Francesca Ussani (WMIT), CC BY-SA 4.0 https://creativecommons.org/licenses/by-sa/4.0, via Wikimedia Commons “When you are laid off,… Continue Reading →

3 Ways to Distinguish between Fake and Real Websites

Fake websites heavily contribute to cyberattacks such as phishing and malware attacks. It is important that we educate and arm ourselves with tools on how to identify a fake website. Clicking on a fake website can cost individuals their identities,… Continue Reading →

ePortfolio #6

How has cyber technology created opportunities for workplace deviance? It is important for organizations to protect their proprietary and customer data from the public and potential hackers; but what about your employees? As the workplace becomes increasingly integrated with the… Continue Reading →

ePortfolio #5

Ways to make money in Cybersecurity Create app security software Yellow teaming Buying security stocks Exploit development tester Researcher Startup company Engineering Consultations University professor Remote analyst IT auditing Trainer YouTube video classes

Article Review 1

Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization by Jurjen Jansen & Rutger Leukfeldt provides a deep dive analysis on the characteristic and behaviors of online banking customers leading… Continue Reading →

Ranking Motives for Cybercrime

Money– Money makes the world go round. Money is how we maintain our basic needs such as food, shelter, and water. Thirty percent of cybercriminals spend their money on converting it to items that keep their value. The idea of… Continue Reading →

ePortfolio #4

Comparing Cyber Risk between the United States and Nigeria As our lives become increasingly integrated with the internet and technology cyber security is becoming a worldwide problem. There are multiple attacks launched on individuals, governments, and businesses every day. These… Continue Reading →

How Maslow’s Hierarchy of Needs relates to my experiences with technology

Maslow’s Hierarchy of need is the theory that as our simplest needs are met, we shift focus towards more complex higher-level needs. As the internet and technology become more integrated into my day to day, it aids in meeting my… Continue Reading →

ePortfolio #3

As the internet becomes more integrated in our daily lives the more, we are storing and transmitting our sensitive information online. Every day million of users are entering their credit card numbers to pay bills, social security numbers for applications,… Continue Reading →

Privacy Rights

PrivacyRights.org has a ton of information regarding data breaches and privacy laws. A breach is a security violation, which leads to sensitive information being duplicated, viewed, transferred, or stolen by an unauthorized user. The information provided on breaches can be… Continue Reading →

« Older posts Newer posts »

© 2025 My Cyber Security Journey — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑