Skip to content

Carl Lochstampfor Jr. ePortfolio

Cybersecurity Undergraduate at Old Dominion University (ODU)

  • Home
    • About Me
    • Resume
    • Certifications
    • Awards & Recognitions
    • Goals & Future Plans
    • IDS 493: Capstone Project
  • Cybersecurity Foundations
    • CYSE 250: Basic Cybersecurity Programming
    • CYSE 300: Intro to Cybersecurity
    • CYSE 301: Cybersecurity Techniques and Operations
    • IT 315: Intro to Networking & Security
    • CYSE 462: Cybersecurity Fundamentals
    • MATH
  • Tech & Society
    • CYSE 200T: Cybersecurity, Technology, & Society
    • CYSE 201S: Cybersecurity & Social Science
    • IDS 300W: Interdisciplinary Theory & Concepts
    • CYSE 418: Enterprise Information Assurance
  • Law & Ethics
    • CYSE 406: Cyber Law
    • CYSE 425: Cyber Strategy & Policy
  • Internship
    • CYSE 368: Cybersecurity Internship
    • CYSE 494: Entrepreneurship in Cybersecurity
  • Cybersecurity Applications
    • CYSE 270: Linux for Cybersecurity
    • CYSE 280: Windows System Management & Security
    • CYSE 420: Applied ML in Cybersecurity
    • CYSE 450: Ethical Hacking & Penetration Testing
    • CS 464: Network Systems Security
  • Blog
  • News
  • Wikis
  • Contact

Category: Philosophy

BioCybersecurity: Ethical Considerations of CRISPR Gene Editing

Ethical data handling is non-negotiable for online business. My paper explores the moral and legal liabilities of IP and user data, detailing the risks of collection, use, and security failure. Protect your brand trust and avoid lawsuits.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

“Going Dark”

The “Going Dark” debate: Should tech companies build backdoors into encrypted devices to aid law enforcement? My CYSE-406 paper analyzes the national security risks against the fundamental right to digital privacy. Where do you stand? Read my analysis!

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Cybercrime: Using Psychological Theories to Understand & Prevent It

To beat cybercrime, you must understand the cybercriminal. My paper uses psychological theories—like Social Learning Theory and Rational Choice Theory—to model and predict criminal behavior. Learn how to build defenses that work.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Hacking Humans

A zero-trust network isn’t enough. You need a human firewall. My research details the critical importance of human-centric defense, exposing how easily people are exploited in sophisticated attacks. Click for the Hacking Humans paper.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Determinism within Cybersecurity & Computer Hacking

An exploration of determinism in cybersecurity, examining how predictable system behavior influences hacking methods, defensive strategies, automation, and ethical considerations.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Designing the Public Sphere with Intelligification

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...
Proudly powered by WordPress | Theme: Dyad by WordPress.com.
%d
    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept