Cybersecurity and Digital Forensics 2025

Category CYSE 200T ePortfolio Assignments

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

Technology is constantly changing every day just like the world is constantly evolving. The meaning behind the “short arm of predictive knowledge” is that instead of looking way down the road one should focus on what is in front of… Continue Reading →

How does cyber technology impact interactions between offenders and victims?

Technology has limited the interactions victims experience with their offenders. A robbery can bestealing company information or files without leaving their home. While the name staysthe same, the description and actions are not. The actions are still illegal such as… Continue Reading →

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

Cybercrimes and the criminal justice system do encounter each other. Many believe that due to cybercrimes being committed on the internet or through a computer, it is not punishable in court or do not apply to a court system. This… Continue Reading →

How do engineers make cyber networks safer?

There are 3 main engineering focuses that work to protect cybersecurity functions. These jobstypically work together to bring the highest protection against cyber threats. The goals for all 3are aligned in completing the security triad of confidentiality, integrity, and availability.Achieving… Continue Reading →

Describe three ways that computers have made the world safer and less safe.

Technology has changed throughout the years which has helped change many aspects of the way people live their daily lives. Examples of this can be shown through healthcare keeping charts on the computer along with vitals everyone can view. This… Continue Reading →

How can you tell if your computer is safe?

Many inexperienced or uneducated users are not aware of the dangers that lurk online. This can range from suspicious emails about a package never ordered, trying to download or watch free movies online, or simply not protecting their information. These… Continue Reading →

What are the costs and benefits of developing cybersecurity programs in business?

Most cyber-related attacks occur in small businesses or even medium-sized ones. The speculated cause is that most small businesses believe they are an unlikely target. They do not produce many if any cyber protections. This can cause a business to… Continue Reading →

How has cyber technology created opportunities for workplace deviance?

Deviance can be defined by going out of the standards set intentionally. Whether it is societal standards or workplace policies. For example, being late or absent at work is an example of work-related deviance. Cyber-related deviance at work can be… Continue Reading →

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.

Career coachYearly cyber conferences to gather connectionsBusiness Startup your own companyExperience in the fieldResearch a specialty to pursue to stand outSecurity ConsultantEngineer in Security ManagingCompete in events/competitionsUndergo certificationsResearch and developInternal Audit ManagerTraining othersYouTube teaching or showcasing channel

Compare cybersecurity risks in the U.S. and another country.

Comparing the difference in the risk between the UK and the US is an intriguing case. While the US ismore prone to attacks and attempts most typically come from inside the country than out. Whilethe data collected is accurate based… Continue Reading →

Describe four ethical issues that arise when storing electronic information about individuals.

Select four other majors offered by ODU and explain how those majors relate to cybersecurity.

Network Engineering teaches how a network is put together and includes how to manage the system. While software is included it is not the main focus, but rather on the devices and functions themselves. It gives a background of how… Continue Reading →

Why are you interested in cybersecurity technology?

I have always had a fascination with technology growing up. Even at a young age I was showing my parents different ways to use floppy discs and showing my grandma how to use her first Chromebook. I built a PC… Continue Reading →

© 2025 Jasmyn Wilhelm — Powered by WordPress

Theme by Anders NorenUp ↑