{"id":330,"date":"2023-01-22T23:03:42","date_gmt":"2023-01-22T23:03:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ldunk001\/?page_id=330"},"modified":"2023-04-24T21:23:45","modified_gmt":"2023-04-24T21:23:45","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ldunk001\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"wp-block-post-template is-layout-flow wp-block-post-template-is-layout-flow\"><li class=\"wp-block-post post-421 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ldunk001\/2024\/07\/28\/journal-entry-1\/\" target=\"_self\" >Journal Entry #1<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">LUKE DUNK5\/22\/2024PROF. DUVALL Starting my journey at Atlantic Bay Mortgage Group (ABMG) as their new Information Technology intern, I transitioned from working retail into an office environment. Within my first 50 hours at ABMG, I felt out of place, as I was not used to working at a computer screen for a long duration of&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2024-07-28T22:32:35+00:00\">July 28, 2024<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-410 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ldunk001\/2023\/04\/29\/journal-entry-15\/\" target=\"_self\" >Journal Entry #15<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker\u2019s pathway to his career. Digital forensics investigators use social sciences to understand the mind of a cybercriminal to help prosecutors store, analyze, and report electronic evidence&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-04-29T17:11:18+00:00\">April 29, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-408 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ldunk001\/2023\/04\/29\/journal-entry-14\/\" target=\"_self\" >Journal Entry #14<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. Top Five Most Serious Violations <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-04-29T17:08:50+00:00\">April 29, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-405 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ldunk001\/2023\/04\/29\/journal-entry-13\/\" target=\"_self\" >Journal Entry #13<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Read this sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter. Economic Theories Keynesian Economic Theory &#8211; After an organization suffers from a data breach, it\u2019s critical that the organization notifies all their participants, including their customers, about how their&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-04-29T17:07:33+00:00\">April 29, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-388 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ldunk001\/2023\/04\/25\/journal-entry-12\/\" target=\"_self\" >Journal Entry #12<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Read this article and write a summary reaction to the use of the policies in your journal. Bug bounty programs offer security researchers the ability to discover and report any cybersecurity vulnerability in an organization\u2019s cyber infrastructure for compensation. Through crowdsourcing, organizations can get an insight on the mind of an attacker and understand how&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-04-25T16:59:10+00:00\">April 25, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-386 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ldunk001\/2023\/04\/24\/journal-entry-11\/\" target=\"_self\" >Journal Entry #11<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Read this and write a journal entry summarizing your response to the article on social cybersecurity. The provided article was highly informative and sheds light on a subdomain in cybersecurity known as social cybersecurity. The concept of social cybersecurity focuses on the scientific principles that achieves two main objectives: Analyze changes in human behavior impacted&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-04-24T22:42:57+00:00\">April 24, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-384 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ldunk001\/2023\/04\/24\/journal-entry-10\/\" target=\"_self\" >Journal Entry #10<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Watch this video. As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. In the video, cybersecurity analysts are classified under many different career tiles and names, but typically have the same job responsibilities. As&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-04-24T22:42:09+00:00\">April 24, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-382 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ldunk001\/2023\/04\/24\/journal-entry-9\/\" target=\"_self\" >Journal Entry #9<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? During the past year, have you &#8230; \u2022 regularly found that you can&#8217;t think of anything else but the moment that you will&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-04-24T22:40:25+00:00\">April 24, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-377 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ldunk001\/2023\/04\/24\/journal-entry-8-2\/\" target=\"_self\" >Journal Entry #8<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity Individuals who do not fully understand the concept of cybersecurity are mostly influenced by the media they consume. Instead, different forms of media have different goals. Some goals focus on solely entertaining the viewers and do&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-04-24T21:15:05+00:00\">April 24, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-371 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ldunk001\/2023\/03\/30\/journal-entry-8\/\" target=\"_self\" >Journal Entry #7<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual\u2019s or individuals\u2019 mind(s) The following meme depicts a happy individual smiling on his computer, with text above saying \u201cWhen you successfully pass the human factor training after the 183049th time.\u201d The meme&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-03-30T17:45:29+00:00\">March 30, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-368 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ldunk001\/2023\/03\/01\/journal-entry-6\/\" target=\"_self\" >Journal Entry #6<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Can you spot three fake websites and compare the three fake websitesto three real websites, plus showcase what makes the fake websitesfake? Many cyberattacks focus on deceiving human judgment to trick victims into providing sensitive information in a fake application. A lot of times, this is in the form of a fake website. The top&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-03-01T01:14:56+00:00\">March 1, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-365 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ldunk001\/2023\/02\/21\/journal-entry-5\/\" target=\"_self\" >Journal Entry #5<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).\u00a0 Explain why you rank each motive the way you rank it After reviewing the linked article on cybercrime motives, I have compromised&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-02-21T02:46:48+00:00\">February 21, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-363 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ldunk001\/2023\/02\/17\/journal-entry-4\/\" target=\"_self\" >Journal Entry #4<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Review Maslow\u2019s Hierarchy of Needs and explain how each level relates to your experiences with technology.\u00a0 Give specific examples of how your digital experiences relate to each level of need. Abraham Maslow\u2019s hierarchy of needs states that all humans are basic, psychological, and self-fulfilling needs based on a hierarchy. Maslow\u2019s hierarchy emphasizes the point that&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-02-17T03:01:27+00:00\">February 17, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-361 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ldunk001\/2023\/01\/29\/journal-entry-3\/\" target=\"_self\" >Journal Entry #3<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">It\u2019s important for researchers to analyze data breaches for multiple reasons through a technical and social lens. Researchers can understand why the data breach occurred to educate others about the issue. This helps mitigate the chances of other organizations becoming victims of this attack vector. In addition, data breaches also provide information about the potential&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-01-29T02:45:08+00:00\">January 29, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-321 post type-post status-publish format-standard hentry category-cyse-201s\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ldunk001\/2023\/01\/22\/journal-entry-2-2\/\" target=\"_self\" >Journal Entry #2<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Science is respected and uses knowledgeable facts to help create, maintain, and improve useful human endeavors inside many industries. Cybersecurity is an applied science that uses a social science framework, that directly relates to natural scientific processes, to discuss human behaviors involving cybersecurity. Some of these social science principles are listed: While some of these&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-01-22T22:48:16+00:00\">January 22, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21557,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/pages\/330"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/users\/21557"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/comments?post=330"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/pages\/330\/revisions"}],"predecessor-version":[{"id":381,"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/pages\/330\/revisions\/381"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/media?parent=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}