Skip to content

Carl Lochstampfor Jr. ePortfolio

Cybersecurity Undergraduate at Old Dominion University (ODU)

  • Home
    • About Me
    • Resume
    • Certifications
    • Awards & Recognitions
    • Goals & Future Plans
    • IDS 493: Capstone Project
  • Cybersecurity Foundations
    • CYSE 250: Basic Cybersecurity Programming
    • CYSE 300: Intro to Cybersecurity
    • CYSE 301: Cybersecurity Techniques and Operations
    • IT 315: Intro to Networking & Security
    • CYSE 462: Cybersecurity Fundamentals
    • MATH
  • Tech & Society
    • CYSE 200T: Cybersecurity, Technology, & Society
    • CYSE 201S: Cybersecurity & Social Science
    • IDS 300W: Interdisciplinary Theory & Concepts
    • CYSE 418: Enterprise Information Assurance
  • Law & Ethics
    • CYSE 406: Cyber Law
    • CYSE 425: Cyber Strategy & Policy
  • Internship
    • CYSE 368: Cybersecurity Internship
    • CYSE 494: Entrepreneurship in Cybersecurity
  • Cybersecurity Applications
    • CYSE 270: Linux for Cybersecurity
    • CYSE 280: Windows System Management & Security
    • CYSE 420: Applied ML in Cybersecurity
    • CYSE 450: Ethical Hacking & Penetration Testing
    • CS 464: Network Systems Security
  • Blog
  • News
  • Wikis
  • Contact

Category: Ethics

“Going Dark”

The “Going Dark” debate: Should tech companies build backdoors into encrypted devices to aid law enforcement? My CYSE-406 paper analyzes the national security risks against the fundamental right to digital privacy. Where do you stand? Read my analysis!

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Cybercrime: Using Psychological Theories to Understand & Prevent It

To beat cybercrime, you must understand the cybercriminal. My paper uses psychological theories—like Social Learning Theory and Rational Choice Theory—to model and predict criminal behavior. Learn how to build defenses that work.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Hacking Humans

A zero-trust network isn’t enough. You need a human firewall. My research details the critical importance of human-centric defense, exposing how easily people are exploited in sophisticated attacks. Click for the Hacking Humans paper.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

The Threat of Deepfakes: An Overview of Human Ability to Detect Them

The biggest threat of deepfakes isn’t the AI—it’s your brain. I detail the psychological reasons (like the “seeing-is-believing” bias) why humans fail to detect these fakes. Don’t be fooled. Read the full research!

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Artificial Intelligence in Digital Forensics: Opportunities, Risks, and Future Directions

Analysis of how artificial intelligence enhances digital forensics, including automation, threat detection, associated risks, and future trends in AI-driven investigations.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Determinism within Cybersecurity & Computer Hacking

An exploration of determinism in cybersecurity, examining how predictable system behavior influences hacking methods, defensive strategies, automation, and ethical considerations.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Security Polices from a CISO’s Perspective

Explores security policies from a CISO’s perspective, highlighting their role in governance, risk management, strategic decision-making, and building organizational security.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Ensuring Accessibility when Implementing the CIA Triad

Examines how to preserve accessibility while implementing the CIA Triad, ensuring systems remain usable, resilient, and secure without disrupting organizational operations.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Human Factors Cybersecurity Engineering: Inclusive Design through Social Science

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Darknet Diaries: Stuxnet

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Darknet Diaries: ZeuS

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Darknet Diaries: Alberto

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Darknet Diaries: Shadow Brokers

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Ensuring Accessibility when Implementing the CIA Triad

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Designing the Public Sphere with Intelligification

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Cyber Technology in Workplace Deviance

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

AI, the Metaverse, & DEI

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

The Law & Encryption Workarounds

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

First Amendment Freedoms & Protections: The Cyber World and You

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

“Going Dark”

An Overview and Analysis of Former FBI Director James Comey’s Security Concerns aboutLaw Enforcement and Encryption

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Cybercrime: Using Psychological Theories to Understand & Prevent It

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

BioCybersecurity: Ethical Considerations of CRISPR Gene Editing

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Hacking Humans

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

The Threat of Deepfakes: An Overview of Human Ability to Detect Them

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Whistleblowing vs. Espionage: A Brief Review of Julian Assange

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Determinism within Cybersecurity & Computer Hacking

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...
Proudly powered by WordPress | Theme: Dyad by WordPress.com.
%d
    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept