Skip to content

Carl Lochstampfor Jr. ePortfolio

Cybersecurity Undergraduate at Old Dominion University (ODU)

  • Home
    • About Me
    • Certifications
    • Awards & Recognitions
    • Goals & Future Plans
  • Milestone Projects
  • Resume
  • Coursework
    • Cybersecurity Foundations
      • CYSE 250: Basic Cybersecurity Programming
      • CYSE 300: Intro to Cybersecurity
      • CYSE 301: Cybersecurity Techniques and Operations
      • IT 315: Intro to Networking & Security
      • CYSE 462: Cybersecurity Fundamentals
      • MATH
    • Cybersecurity Applications
      • CYSE 270: Linux for Cybersecurity
      • CYSE 280: Windows System Management & Security
    • Tech & Society
      • CYSE 200T: Cybersecurity, Technology, & Society
      • CYSE 201S: Cybersecurity & Social Science
    • Law & Ethics
      • CYSE 406: Cyber Law
  • Blog
  • News
  • Contact

Category: Philosophy

BioCybersecurity: Ethical Considerations of CRISPR Gene Editing

Ethical data handling is non-negotiable for online business. My paper explores the moral and legal liabilities of IP and user data, detailing the risks of collection, use, and security failure. Protect your brand trust and avoid lawsuits.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

“Going Dark”

The “Going Dark” debate: Should tech companies build backdoors into encrypted devices to aid law enforcement? My CYSE-406 paper analyzes the national security risks against the fundamental right to digital privacy. Where do you stand? Read my analysis!

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Cybercrime: Using Psychological Theories to Understand & Prevent It

To beat cybercrime, you must understand the cybercriminal. My paper uses psychological theories—like Social Learning Theory and Rational Choice Theory—to model and predict criminal behavior. Learn how to build defenses that work.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Hacking Humans

A zero-trust network isn’t enough. You need a human firewall. My research details the critical importance of human-centric defense, exposing how easily people are exploited in sophisticated attacks. Click for the Hacking Humans paper.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Determinism within Cybersecurity & Computer Hacking

An exploration of determinism in cybersecurity, examining how predictable system behavior influences hacking methods, defensive strategies, automation, and ethical considerations.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Designing the Public Sphere with Intelligification

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...
Proudly powered by WordPress | Theme: Dyad by WordPress.com.
%d
    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept