ODU Logo

EvanKashmer

ODU Class of 2027

Author ekash001

Career Paper

Introduction             In a field that is always expanding and changing in cybersecurity, professionals are hired by organizations to protect their digital assets and networks from all different kinds of online threats. In cybersecurity, one may think that the technical… Continue Reading →

Article Review #2

Social Sciences             Whilst reading this article, I came to the conclusion of 3 different social sciences, the first being sociology because it plays a crucial role in understanding Iraq’s digital workplace. It examines how individuals, groups, and organizations perceive… Continue Reading →

Article Review #1

Understanding Artificial Intelligence in Cybersecurity Social Sciences             This article based on understanding artificial intelligence in cybersecurity largely relates to the social sciences, mainly psychology and criminology. This article goes in depth about how artificial intelligence influences criminal motives and… Continue Reading →

Article Review’s

This page is dedicated to the two article reviews that I completed and submitted in this cybersecurity class. For each one, we choose a different professional article and reviewed it / summed it up.

Journal Entry #15

I feel as though his pathway into his career is similar to many peoples, whether they are kind of put into it, or simply think it is cool. In his case, he was put into an accounting field, went into… Continue Reading →

Journal Entry #14

In no order, out of the eleven illegal things internet users do, there are certainly five that stick out to me. The first being faking your identity online, because this can mean anything from identity theft to simply lying about… Continue Reading →

Journal Entry #13

In this article, there was a study ran on bug bounties, which is a program usually done by online websites which will reward people that are able to find any type of bug or opening in their system or networks…. Continue Reading →

Journal Entry #12

The two economic theories that best relate to this article are the game theory and the theory of information asymmetry. This is because game theory helps explain analyze the strategic ways in which stakeholders such as hackers, consumers, and business… Continue Reading →

Journal Entry #11

The role of being a cybersecurity analyst in this presentation reflected many different types of social themes. The first being you must think about where you are trying to become a cybersecurity analyst because you have to think about cost… Continue Reading →

Journal Entry #10

In summary, this army cybersecurity article explains how most risks within any country will more than likely always be internal, rather than external, even though it seems as though we only focus on the external and not the internal. It… Continue Reading →

« Older posts

© 2025 EvanKashmer — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑