Jasmyn Wilhelm

Cybersecurity and Digital Forensics 2025

Page 7 of 8

System monitoring and the use of network traffic log files are extremely important for gauging baseline performance and observing events.  Why does identifying abnormal behavior first require having a baseline?  What can a log file show that lends insight into abnormal behavior?

Establishing a baseline is essential for understanding how the normal flow of business will show on a report. You cannot know what is abnormal without first defining what normal is. Observing traffic for one day is not sufficient data, but… Continue Reading →

Imagine you are a manager responsible for implementing a significant cybersecurity-related technology change within an organization. What are the potential reactions to this change?  Indicate one way in which you would minimize the impact of adverse reactions within the change management process. Provide support for your recommendation.

The best way to minimize a bad reaction to a lot of change is to teach about the benefits. Harvard Business Review lists 3 things people consider most when change is involved. Difficulty is vital as people would like to know how… Continue Reading →

What are the benefits and risks of the use of SSO?  Specify measures that can be taken to better secure an SSO system.

One of the benefits of SSO is the less use of typing in the same username and passwords on multiple sites or applications. It can limit the number of issues related to password lockouts which reduces the workload of help… Continue Reading →

The decision to escalate incidents to law enforcement is an area fraught with conflict. In your opinion, what are the pros and cons of law enforcement involvement?  What resources and references can you cite to back up your assertions?

If law enforcement is not involved in the process of reporting cybercrime then why put our trust in companies? The debate starts as panic can spread when people find that a massive breach has occurred and information is at risk,… Continue Reading →

What is the difference between a threat and an attack?  How do exploits relate to vulnerabilities?  Is there an ethically acceptable reason to study and use the various attack methods described in this module?

A threat can be defined as an interpretation or words that convey a vulnerability and a plan to act on it. An attack is an actual attempt to exploit that vulnerability. A threat can be defined as a risk of… Continue Reading →

In your opinion, what are the biggest IoT security risks and challenges?  Cite resources and references that back up your assertions.

I would say the biggest risk of IoT is the lack of secure communications and data storage.  ITNS Consulting posted an article explaining the 5 biggest threats relating to IoT. One of the items listed is communications. In the article,… Continue Reading →

What is the defining difference between computer security and information security?  Why can we argue that information security is really an application of social science?

I believe the main difference between computer security and information security is a matter of what is being protected. Cybersecurity focuses on the technical aspect of data stored in a cloud, on a server, or over a network, etc. Cybersecurity… Continue Reading →

Lab Reports for CYSE 301

How can you tell if your computer is safe?

Many inexperienced or uneducated users are not aware of the dangers that lurk online. This can range from suspicious emails about a package never ordered, trying to download or watch free movies online, or simply not protecting their information. These… Continue Reading →

What are the costs and benefits of developing cybersecurity programs in business?

Most cyber-related attacks occur in small businesses or even medium-sized ones. The speculated cause is that most small businesses believe they are an unlikely target. They do not produce many if any cyber protections. This can cause a business to… Continue Reading →

How has cyber technology created opportunities for workplace deviance?

Deviance can be defined by going out of the standards set intentionally. Whether it is societal standards or workplace policies. For example, being late or absent at work is an example of work-related deviance. Cyber-related deviance at work can be… Continue Reading →

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.

Career coachYearly cyber conferences to gather connectionsBusiness Startup your own companyExperience in the fieldResearch a specialty to pursue to stand outSecurity ConsultantEngineer in Security ManagingCompete in events/competitionsUndergo certificationsResearch and developInternal Audit ManagerTraining othersYouTube teaching or showcasing channel

Compare cybersecurity risks in the U.S. and another country.

Comparing the difference in the risk between the UK and the US is an intriguing case. While the US ismore prone to attacks and attempts most typically come from inside the country than out. Whilethe data collected is accurate based… Continue Reading →

Describe four ethical issues that arise when storing electronic information about individuals.

Select four other majors offered by ODU and explain how those majors relate to cybersecurity.

Network Engineering teaches how a network is put together and includes how to manage the system. While software is included it is not the main focus, but rather on the devices and functions themselves. It gives a background of how… Continue Reading →

« Older posts Newer posts »

© 2025 Jasmyn Wilhelm — Powered by WordPress

Theme by Anders NorenUp ↑