ODU Logo

Jaden Walker

  • Home
  • Academics
    • CYSE200T
      • DISCUSSION Post: Protecting Availability
      • The Role of SCADA in Critical Infrastructure Security
      • Understanding the CIA Triad and Authentication vs. Authorization
    • CYSE 201S
      • Career professional paper
        • DevSecOps and Detection Engineering:Integrating Social Science Principles intoCybersecurity Practices
      • Article Reviews
        • Article Review 1:Cybersecurity Politics in Egypt: Manipulating UncertaintyArticle
        • Article Review 2:Implementing information security controls: now or later?
      • Journal Entries
        • Week1
        • Week 2
        • Week 3
        • Week 4
        • Week 5
        • Week 6
        • Week 7
        • Week 8
        • Week 10
        • Week 11 – Journal Entry 10
        • Week 11 – Journal Entry 11
        • Week 12- Journal Entry 12
        • Week 12 – Journal Entry 13
        • Week 13 – Journal Entry 14
        • Week 15 – Journal Entry 15
  • See My Resume
  • About Me
  • Home
  • Academics
    • CYSE200T
      • DISCUSSION Post: Protecting Availability
      • The Role of SCADA in Critical Infrastructure Security
      • Understanding the CIA Triad and Authentication vs. Authorization
    • CYSE 201S
      • Career professional paper
        • DevSecOps and Detection Engineering:Integrating Social Science Principles intoCybersecurity Practices
      • Article Reviews
        • Article Review 1:Cybersecurity Politics in Egypt: Manipulating UncertaintyArticle
        • Article Review 2:Implementing information security controls: now or later?
      • Journal Entries
        • Week1
        • Week 2
        • Week 3
        • Week 4
        • Week 5
        • Week 6
        • Week 7
        • Week 8
        • Week 10
        • Week 11 – Journal Entry 10
        • Week 11 – Journal Entry 11
        • Week 12- Journal Entry 12
        • Week 12 – Journal Entry 13
        • Week 13 – Journal Entry 14
        • Week 15 – Journal Entry 15
  • See My Resume
  • About Me

Journal Entries

    • Week 15 – Journal Entry 15
      After watching Davin Teo’s TEDx talk on digital forensics, I realized how closely digital forensics connects to the social sciences. Teo’s pathway into the field highlights a strong intersection between technology and understanding human behavior. Investigators must not only analyze… Continue Reading →
    • DevSecOps and Detection Engineering:Integrating Social Science Principles intoCybersecurity Practices
    • Article Review #2:Implementing information security controls: now or later?
    • Week 13 – Journal Entry 14
      Some of the most serious internet violations outlined by Andriy Slynchuk include using unofficial streaming services, torrenting copyrighted material, cyberbullying, identity fraud, and searching for illegal content online. These actions are serious because they often result in significant harm, whether… Continue Reading →
    • DISCUSSION Post: Protecting Availability
      In this discussion post, I am the CISO for a publicly traded company. What protections would I implement to ensure availability of your systems (and why)? As the Chief Information Security Officer (CISO) of a publicly traded company, ensuring system availability… Continue Reading →
    • The Role of SCADA in Critical Infrastructure Security
    • Understanding the CIA Triad and Authentication vs. Authorization
    • Week 12 – Journal Entry 13
      The article, Hacking for Good: Leveraging HackerOne Data to Develop an Economic Model of Bug Bounties, provides significant insights into bug bounty policies from both economic and social perspectives. Economically, the authors identified that security researchers exhibit low price elasticity… Continue Reading →
    • Week 12- Journal Entry 12
      The “Sample Data Breach Notification” from Glasswasherparts.com relates clearly to two economic and two social science theories. Economic Theories: Social Science Theories:
    • Article Review 1:Cybersecurity Politics in Egypt: Manipulating UncertaintyArticle
    • Week 11 – Journal Entry 11
      The presentation of the cybersecurity analyst role reveals several compelling social themes that extend beyond technical defenses. Analysts are not only tasked with identifying and mitigating digital threats but must also understand human behavior and societal trends that contribute to… Continue Reading →
    • Week 11 – Journal Entry 10
      The article on social cybersecurity offers a comprehensive examination of how cyber technology is reshaping modern conflict by targeting human behavior rather than just information systems. It highlights that, unlike traditional cybersecurity which defends against technical intrusions, social cybersecurity involves… Continue Reading →
    • Week 10
      I scored a 3 on the Social Media Disorder Scale, which falls under the “risky” usage category. I think the items in the scale are very relevant, as they reflect some of the emotional and behavioral patterns that come with… Continue Reading →
    • Week 8
      How the Media Influences Our Understanding of Cybersecurity Movies and TV shows often exaggerate or distort hacking, shaping public perception in misleading ways. Many portray hackers as typing furiously on a keyboard, bypassing security systems within seconds with flashy animations…. Continue Reading →
    • Week 7
      When the users are happy that they get to work from home via vpn but it took the system administrator, network, and cyber teams 6 weeks to set the infrastructure up. This meme reflects the core of Human-Centered Cybersecurity by… Continue Reading →
    • Week 6
      Fake websites often mimic legitimate ones to deceive users. Here are three examples: These fraudulent sites often employ tactics like URL manipulation, imitation of design elements, and enticing offers to mislead users. Vigilance, such as verifying URLs and ensuring secure… Continue Reading →
    • Week 5
      For Money Financial gain is a primary driver for many cybercriminals. The article from HP Threat Research highlights how cybercriminals profit from illegal activities, using their earnings for various personal and illicit expenditures. The potential for substantial financial rewards makes… Continue Reading →
    • Week 4
      Maslow’s Hierarchy of Needs is evident in how I integrate technology into my daily life. At the physiological level, a dependable internet connection and reliable devices help me manage coursework efficiently. My safety needs are met by using multi-factor authentication,… Continue Reading →
    • Week 3
      Researchers can use PrivacyRights.org to analyze data breaches and find patterns in how they happen. Looking at past breaches helps identify common vulnerabilities and which industries are targeted the most. By studying this data, researchers can track trends in attack… Continue Reading →
    • Week 2
      The principles of science which describe empiricism, determinism, parsimony, and objectivity are closely tied to cybersecurity. Empiricism involves relying on evidence, such as analyzing logs and data, to detect and respond to threats effectively. Determinism emphasizes cause-and-effect relationships, helping security… Continue Reading →
    • Week1
      Cybersecurity architecture, defensive cybersecurity, and systems security analysis are essential components of the NICE Workforce Framework. Cybersecurity architecture focuses on designing secure systems and integrating protections to counter evolving threats. Defensive cybersecurity emphasizes detecting, mitigating, and responding to attacks to… Continue Reading →

    Latest posts

    • Week 15 – Journal Entry 15
    • DevSecOps and Detection Engineering:Integrating Social Science Principles intoCybersecurity Practices
    • Article Review #2:Implementing information security controls: now or later?
    • Week 13 – Journal Entry 14
    • DISCUSSION Post: Protecting Availability

    Text widget

    These widgets are displayed because you haven't added any widgets of your own yet. You can do so at Appearance > Widgets in the WordPress settings.

    Search form

    Latest posts

    • Week 15 - Journal Entry 15
    • DevSecOps and Detection Engineering:Integrating Social Science Principles intoCybersecurity Practices
    • Article Review #2:Implementing information security controls: now or later?
    • Week 13 - Journal Entry 14
    • DISCUSSION Post: Protecting Availability
    • LinkedIn
    • GitHub
    • Medium

    © 2025 Jaden Walker — Powered by WordPress

    Original theme by Anders Noren | Adapted by ITS — Up ↑

    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept