ODU Logo

Jaden Walker

Author jwalk015

Article Review #2:Implementing information security controls: now or later?

Week 13 – Journal Entry 14

Some of the most serious internet violations outlined by Andriy Slynchuk include using unofficial streaming services, torrenting copyrighted material, cyberbullying, identity fraud, and searching for illegal content online. These actions are serious because they often result in significant harm, whether… Continue Reading →

DISCUSSION Post: Protecting Availability

In this discussion post, I am the CISO for a publicly traded company. What protections would I implement to ensure availability of your systems (and why)? As the Chief Information Security Officer (CISO) of a publicly traded company, ensuring system availability… Continue Reading →

The Role of SCADA in Critical Infrastructure Security

Understanding the CIA Triad and Authentication vs. Authorization

Week 12 – Journal Entry 13

The article, Hacking for Good: Leveraging HackerOne Data to Develop an Economic Model of Bug Bounties, provides significant insights into bug bounty policies from both economic and social perspectives. Economically, the authors identified that security researchers exhibit low price elasticity… Continue Reading →

Week 12- Journal Entry 12

The “Sample Data Breach Notification” from Glasswasherparts.com relates clearly to two economic and two social science theories. Economic Theories: Social Science Theories:

Article Review 1:Cybersecurity Politics in Egypt: Manipulating UncertaintyArticle

Week 11 – Journal Entry 11

The presentation of the cybersecurity analyst role reveals several compelling social themes that extend beyond technical defenses. Analysts are not only tasked with identifying and mitigating digital threats but must also understand human behavior and societal trends that contribute to… Continue Reading →

Week 11 – Journal Entry 10

The article on social cybersecurity offers a comprehensive examination of how cyber technology is reshaping modern conflict by targeting human behavior rather than just information systems. It highlights that, unlike traditional cybersecurity which defends against technical intrusions, social cybersecurity involves… Continue Reading →

« Older posts Newer posts »

© 2026 Jaden Walker — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑