ODU Logo

Eportfolio

Kojo Agyemang

Author kagye002

Journal entry 10

The Russian propaganda apparatus, long directed at its society and the satellite states of the former Soviet Union is now aiming at targets abroad. In 2013, Gen. Valery Gerasimov identified information warfare as an essential aspect of Russian warfare going… Continue Reading →

Journal Entry 9

1. Regularly found that you can’t think of anything else but the moment you will be able to use social media again? Yes/No (Preoccupation). 2. Regularly felt dissatisfied because you want to spend more time on social media? Yes/No (Tolerance)…. Continue Reading →

Journal entry 8

Recently, I’ve realized the profound impact the media has on shaping our perceptions of cybersecurity. The media often amplifies the sense of urgency and fear surrounding cyber threats through sensational headlines and dramatic narratives. This can lead to heightened awareness,… Continue Reading →

Journal Entry 7

Image three: The meme is when you successfully catch a hacker who tries stealing someone’s information. In the picture, the individual sits in a chair with a laptop, smiling at the camera. I believe in the individual’s head; he is considering… Continue Reading →

Journal Entry 6

The first fake website I found was a website pretending to be Amazon. I figured this website was fake because it was misspelled when I looked at how Amazon was spelled, like “amaz0n” on the URL. The correct way to… Continue Reading →

Journal entry 5

I would rank entertainment crimes as number 7 on the list because entertainment crimes are not as severe as the other crimes on the list. Political crimes are number 3 because they are more severe than most, and politics is… Continue Reading →

Journal entry 4

From bottom to top, Maslow’s Hierarchy of Needs includes physiological, safety, love/belonging, esteem, and self-actualization needs. Physiological: My smartphone lets me order food and water delivery, addressing basic needs without leaving my home.Safety: Security systems and apps I use provide… Continue Reading →

Journal entry 3

Researchers might leverage the information from a site like PrivacyRights.org to study data breaches by comprehensively analyzing the breaches’ characteristics and consequences. By examining incident reports, researchers can discern patterns regarding breaches, the types of data targeted, the industries most… Continue Reading →

Journal Entry 2

Science principles like observation, hypothesis formulation, and experimentation are integral to cybersecurity. Observation is crucial in cybersecurity for monitoring network activities and identifying potential threats or anomalies. Security professionals constantly observe system behaviors and log data to detect irregular patterns… Continue Reading →

Jounral Entry 1

My Career framework  I would focus my career on Cyber Defense Analysis. I chose this one over the rest because the whole reason why I chose cyber security was to stop hackers and stop people’s information from getting stolen, and… Continue Reading →

Newer posts »

© 2025 Eportfolio — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑