ODU Logo

My Cyber Security Journey

Danielle K.

Category CYSE 201S

How the Media Influences our Understanding about Cybersecurity

The media is a social force that shapes our attitudes and practices surrounding cybersecurity. The Media can both positive and negatively influence our understanding of Cybersecurity. Starting with the positive some feature films and television shows use real world cybersecurity… Continue Reading →

Cybersecurity Memes

“Another awareness training…” Organizations should implement frequent human factors trainings to shape and mold your associate attitudes towards cybersecurity and the human impact on cyberattacks. Francesca Ussani (WMIT), CC BY-SA 4.0 https://creativecommons.org/licenses/by-sa/4.0, via Wikimedia Commons “When you are laid off,… Continue Reading →

3 Ways to Distinguish between Fake and Real Websites

Fake websites heavily contribute to cyberattacks such as phishing and malware attacks. It is important that we educate and arm ourselves with tools on how to identify a fake website. Clicking on a fake website can cost individuals their identities,… Continue Reading →

Article Review 1

Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization by Jurjen Jansen & Rutger Leukfeldt provides a deep dive analysis on the characteristic and behaviors of online banking customers leading… Continue Reading →

Ranking Motives for Cybercrime

Money– Money makes the world go round. Money is how we maintain our basic needs such as food, shelter, and water. Thirty percent of cybercriminals spend their money on converting it to items that keep their value. The idea of… Continue Reading →

How Maslow’s Hierarchy of Needs relates to my experiences with technology

Maslow’s Hierarchy of need is the theory that as our simplest needs are met, we shift focus towards more complex higher-level needs. As the internet and technology become more integrated into my day to day, it aids in meeting my… Continue Reading →

Privacy Rights

PrivacyRights.org has a ton of information regarding data breaches and privacy laws. A breach is a security violation, which leads to sensitive information being duplicated, viewed, transferred, or stolen by an unauthorized user. The information provided on breaches can be… Continue Reading →

How the Principles of Science Relate to Cyber Security?

Science and Cyber Security are closely related in the sense of the research methods used to answer a question or solve a problem. Just as evolutionist prosed questions the more humans evolved, as the internet evolves, we are prosing more… Continue Reading →

Newer posts »

© 2025 My Cyber Security Journey — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑