Policy Analysis 2

Including Cybersecurity in Standards of Learning             Including cybersecurity in standards of learning (SOL) is not only a commonly discussed topic but a crucial subject that needs to be prioritized considering that children in grade school are not being introduced and learning cybersecurity as they should be. The foundation and basics of cybersecurity need to…

Policy Analysis 1

Including Cybersecurity in Standards of Learning             Including cybersecurity in standards of learning (SOL) is an important policy and strategy that needs to continue being executed and put in place for children and students. It is important for knowledge about cybersecurity and its importance to be taught to people unaware because of the costs it…

Reflection Paper 3

With internship clinic coming to a close, my team and I (Team Moss) have been able to successfully create a risk assessment report for our client (Dr. Gwendolyn Moss) and produce an appealing presentation to debrief our report. We are currently touching up our presentation to make sure it is polished and revised to ensure…

Reflection Paper 2

Moving further with my experience in this internship, I have started to gain experience and skills related to speaking and consulting with potential clients/customers when it comes to cybersecurity assessments and making an effort to improve their cyber infrastructure. My partner and I stopped by four different companies/businesses in the ODU area and introduced ourselves…

Reflection Paper 1

Why am I interested in cybersecurity? The main reason this field gains my interest is how complex the cyber world is and the fact that it is evolving every day is exciting to me. The feeling that not every day will be the same also draws me into wanting to learn more and gain more…

Cybersecurity Career Paper

Cybersecurity Career Professional Paper           The career in the Cybersecurity field I chose for this paper is the Cybersecurity Analyst career. This is also the specific career I want to pursue in the Cybersecurity field. Cybersecurity Analysts “Protect a company’s software, hardware, and computer networks from being stolen or poisoned from hackers or people with…

Article Review 2

Article Review 2 I will be reviewing the article “Artificial Intelligence in Cyber Defense” with artificial intelligence being used in computer systems and networks to defend against malicious attacks and different forms of malware. AI or artificial intelligence is computer systems able to make decisions or perform specific tasks that human can perform or maybe…

Crime Research Report

Section 1 (Introduction)             My topic of choice is drug trafficking and drug incarceration, and I will go into detail and explain on why drug trafficking is a problem and society. Drug trafficking has been an ongoing problem in society and the other crimes in which it can create around it in its environment. Drug…

Case Analysis 3

CA2 – Deontology Tool The article talks explains Europe’s new implementation of GDPR (General Data Protection Regulation). GDPR is the core of Europe’s digital information privacy legislation. GDPR is not only available to organizations and businesses in the EU but are also available to organizations and businesses that are located in other places internationally but…