ODU Logo

Wang's Profolio

CyberSecurity eProfolio

Page 2 of 3

Journal #3-201S

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Abraham Maslow’s hierarchy of needs has five levels, beginning with… Continue Reading →

Journal #2- 201S

explain how the principles of science relate to cybersecurity It can be said that cybersecurity is an applied science that designs the necessary skills required to secure, protect, and identify vulnerabilities in a network including knowledge of various operating systems… Continue Reading →

Journal #1-201S

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. Going through the NICE Workforce Framework, I… Continue Reading →

Journal Entry #7

1. How does cyber technology impact interactions between offenders and victims? 2. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? With the modern advancements in cyber technology in today’s world have… Continue Reading →

Journal Entry #6

1. How do engineers make cyber networks safer? 2. What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Engineers are the key components to a safer and better… Continue Reading →

Journal Entry #5

1.  How can you tell if your computer is safe? 2. Describe three ways that computers have made the world safer and less safe. There are many ways to tell if your computer is safe. Usually, it can be shown that your… Continue Reading →

Journal Entry #4

What are the costs and benefits of developing cybersecurity programs in business? Businesses can lose millions of dollars as a result of cyber-attacks and data breaches, depending on how serious the attack is. An organization’s cost of a data breach… Continue Reading →

Journal Entry #3

How has cyber technology created opportunities for workplace deviance? In the modern-day world of technology, if not everything, a majority of information and articles are stored digitally. Digital storage may range from personal documentation/information to personal assets to passwords. These… Continue Reading →

Entry #2, Week 2

1. Describe four ethical issues that arise when storing electronic information about individuals. 2. Compare cybersecurity risks in the U.S. and another country. When it comes to storing electronic information about individuals, four major ethical issues arises from it. a)… Continue Reading →

Journal Entry #1

Why are you interested in cybersecurity technology? Select four other majors offered by ODU and explain how those majors relate to cybersecurity.  I am interested in cybersecurity technology because of its wonders and its reverse reality. Another reason why on… Continue Reading →

« Older posts Newer posts »

© 2024 Wang's Profolio — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑