ODU Logo

marquais-hendrick

Student Name

Page 2 of 2

Journal 11

Watch this video. As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0, think about howthe description of the cybersecurity analyst job relates to socialbehaviors. Write a paragraph describing social themes that arise in thepresentation.CYSE201S 32 The job description of a cybersecurity analyst typically involves… Continue Reading →

Journal 10

Read this and write a journal entry summarizing your response to thearticle on social cybersecurityhttps://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/CYSE201S 6 The article discusses the emerging field of social cybersecurity, which focuses on understanding and forecasting cyber-mediated changes in human behavior and social, cultural, and… Continue Reading →

Journal 8

The media can influence our understanding of cybersecurity by framing stories in particular ways, using complex terminology or oversimplifying topics, highlighting high-profile incidents while ignoring smaller ones, and relying on cybersecurity experts whose opinions may not reflect a consensus. While… Continue Reading →

Journal 6

Can you spot three fake websites and compare the three fake websitesto three real websites, plus showcase what makes the fake websitesfake? Fake websites Save The Pacific Northwest Tree Octopus (zapatopi.net) Creepy Uncle Joe Biden 2020 http://www.thedogisland.com/ Real website https://www.google.com/aclk?sa=l&ai=DChcSEwi587v7o7f9AhWkyJQJHXOaAIkYABAAGgJ5bQ&sig=AOD64_1yrHQMGjn0qJpcqINQLjynwcmWEg&q&adurl&ved=2ahUKEwiFjrL7o7f9AhVwFlkFHYGxA9gQ0Qx6BAgDEAE… Continue Reading →

Journal 4

Review Maslow’s Hierarchy of Needs and explain how each levelrelates to your experiences with technology. Give specific examples ofhow your digital experiences relate to each level of need. First, I would start out with physiological needs. A time where separation… Continue Reading →

Journal 3

Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information tostudy breaches? Enter a paragraph in your journal. Researchers may use the information listed on this website to study patterns in data… Continue Reading →

Journal 1

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. After reviewing the NICE workforce framework, the… Continue Reading →

Journal 2

Explain how the principles of science relate to cybersecurity. The principles of science are related in cybersecurity being the use for analyzing security threats, developing countermeasures and making informed decisions. They help ensure that security measures are evidence-based and effective…. Continue Reading →

Newer posts »

© 2025 marquais-hendrick — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑