ODU Logo

mahad

Student Name

Category Uncategorized

Week 12 – Journal Entry 12

The “Sample Data Breach Notification” letter from Glasswasherparts.com can be understood through both economic and social science perspectives. Economically, the theory of information asymmetry applies. The company had knowledge of the data breach well before customers were informed, creating an… Continue Reading →

Article Review #2: Cybersecurity Literacy Programs for Marginalized Communities: Bridging the Gap in Digital Security

Mahad AhmadMarch 30, 2025IntroductionThe digital divide has long been recognized as a barrier to equitable access to technology.The article Cybersecurity Literacy Programs for Marginalized Communities: Bridging theGap in Digital Security examines how marginalized communities are more vulnerable tocyber threats due… Continue Reading →

Week 11 – Journal Entry 11

In the presentation, the role of a cybersecurity analyst highlights various social behaviors such as teamwork, adaptability, and problem-solving within a high-demand, fast-paced environment. The job requires constant communication and collaboration with others, whether responding to phishing attacks, training employees,… Continue Reading →

Week 11 – Journal Entry 10

The article on social cybersecurity underscores the rising importance of understanding the role of social dynamics in cybersecurity, especially in terms of manipulating public opinion through digital means. It argues that cyber threats are not only technical but also social,… Continue Reading →

Week 8 – Journal Entry

The media significantly influences our perceptions of cybersecurity, often spotlighting dramatic breaches, headline-grabbing hacks, and alarming vulnerabilities. While this type of coverage can effectively grab attention and raise awareness, it can also skew our understanding by focusing too much on… Continue Reading →

Week 7 – Journal Entry

Users often ignore or forget security policies due to habit and convenience. Even after training, people may still choose weak passwords because they believe they won’t be targeted. People are becoming more aware of phishing scams but still hesitate to… Continue Reading →

Week 6 – Journal Entry

Real Website:facebook.com Official, secure connection (HTTPS). Consistent branding and design. Fake Website:faceb00k.com (notice the “0” instead of “o”) Slight misspelling in the URL. May lack proper security certificates or show a warning. Real Website:amazon.com Recognizable layout and reliable customer service… Continue Reading →

Week 5 – Journal Entry

The motive that makes the most sense is “For money” (1) because financial gain is a strong incentive for cybercriminals, and many attacks are profit-driven. Ransomware, fraud, and data theft are common methods used to generate income. “Multiple reasons” (2)… Continue Reading →

Article Review #1: Cyberbullying on Social Media: Definitions, Prevalence, and Impact on Marginalized Groups

Mahad Ahmad February 16, 2025 Introduction The pervasive growth of social media has transformed communication, yet it has also facilitated the emergence of cyberbullying—a form of harassment conducted through digital platforms. The scholarly article “Cyberbullying on Social Media: Definitions, Prevalence,… Continue Reading →

Week 4 – Journal Entry

Maslow’s Hierarchy of Needs is a psychological theory that outlines five levels of human needs, arranged in a pyramid. Starting with the basics, it includes physiological needs (like food and shelter), safety needs (security and stability), love and belonging (relationships… Continue Reading →

« Older posts Newer posts »

© 2025 mahad — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑