Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source]. Compare the three fake websites to three real websites and highlight the features and similarities that identify each fake website as fraudulent. I compared three fraudulent websites with their legitimate counterparts (PayPal, Chase Bank, and…
Author: jteas001
Journal Entry #5
Review the articles linked with each individual motive in slide/page #3. Rank the motives from 1 to 8 as the motives that you think make the most sense (being 1) to the least sense (being 8). Explain why you rank each motive the way you rank it. After reviewing the articles linked, I have come…
Journal Entry #4
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Maslow’s Hierarchy of Needs connects strongly to technology. At the physiological level, technology supports basic needs through food delivery apps, online grocery services, and health…
Journal Entry #3
Visit PrivacyRights.orgLinks to an external site. to see the types of publicly available information about data breaches. How might researchers use this information to study breaches and forecast future data breach trends ? Enter a paragraph in your journal. While exploring PrivacyRights.org’s Data Breach Chronology, I noticed how detailed and organized the data is. The site tracks publicly reported data breaches…
Journal Entry #2
How does the principle of empiricism enhance the effectiveness of cybersecurity practices? Reflect on how empirical data collection and analysis can help identify emerging threats, assess the effectiveness of current security measures, and guide the development of new strategies to protect information systems. The principle of empiricism enhances cybersecurity because it emphasizes using real evidence…
Journal Entry #1
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas are most appealing to you and which are least appealing. After reviewing the NICE framework for cybersecurity, I have found a few areas where I would like to focus on my career. Based on my motives,…
Article Review #2
Article Review #2: “Malware Infections in the U.S. during the COVID-19 Pandemic: An Empirical Study.” Jayden Teasley School of Cybersecurity, Old Dominion UniversityCYSE 201S: Cybersecurity and the Social SciencesDr. Diwakar YalpiNovember 16, 2025 Introduction This article looks at how malware infections in the United States changed during the first six months of the COVID-19…
Article Review #1
Article Review #1 “The Security Mindset” Koen Schoenmakers, Daniel Greene, Sarah Stutterheim, Herbert Lin, Megan J Palmer Introduction This article examines the concept of the “security mindset”, a way of thinking where people consistently look for flaws, weaknesses, and vulnerabilities in everyday systems. The concept is referred to a lot in cybersecurity but doesn’t have a…
Cybersecurity Professional Paper
Cybersecurity Career Professional Paper: Analysis on Cybersecurity Jayden Teasley School of Cybersecurity, Old Dominion University CYSE 201S: Cybersecurity and the Social Sciences Dr. Diwakar YalpiNovember 16, 2025 Introduction The cybersecurity profession has become one of the most essential fields in today’s digital landscape. As society increasingly depends on technology for communication, business operations, healthcare, education,…
Components of a Business
A business is made up of many important parts that help it run successfully. Some of these parts include Legal, Internal Auditing, Technical Support, Knowledge Management, Policies and Procedures, Supply Chain Management, Public Relations, and Vendor Management. Each of these fits into a different area of the company. For example, the Legal department usually works…