ODU Logo

nadiaeportifoliocyse201s

Nadia Simpson

Page 2 of 2

Week 10 – Journal Entry 9

After taking the Social Media Disorder Scale I scored a 5 out of 9 which means that I fit the criteria to be formally diagnosed as a disordered social media user. In my opinion, I believe that the items in… Continue Reading →

Journal Entry 8

After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. After watching the video twice, the media makes it seem that hacking is easier than it is in the scene in… Continue Reading →

Journal Entry 7

meme for the photo: Training the new employees is so difficult This meme relates to the human-centered cybersecurity framework because training employees on cybersecurity practices is important to mitigate risks and prevent human error. Training employees can help mitigate risks… Continue Reading →

Journal Entry 6

The difference between a real website and a fake website is that a real website has a padlock next to the URL while a fake website doesn’t have the padlock next to it. A fake website would send you phishing… Continue Reading →

Journal Entry #5

1- Political 2. Money 3. Revenge 4. Recognition 5. Multiple Reasons 6. Entertainment 7. Fun I ranked all the motives the way I did because hacking for political reasons made the most sense. After all, it helps support movements exposes… Continue Reading →

Journal Entry #4

The Maslow’s hierarchy of needs talks about the needs that humans have and their motivations behind those needs. The Maslow’s hierarchy of needs starts with Physiological needs and ends with self actualization. With self actualization when it comes to technology… Continue Reading →

Journal Entry #3

PrivacyRights.org shows the laws in different states when it comes to data and their privacy. The website also shows the most common types of data breaches and the companies that have the most data breaches. I feel like researchers can… Continue Reading →

Week 2 Journal Entry

When it comes to cybersecurity and the principles of science, parsimony stood out to me the most because with cybersecurity people need to analyze why people commit cybercrimes the PowerPoint brings up the self-control theory which states that people commit… Continue Reading →

Week 1 Journal Entry

After reviewing the NICE framework, I want to focus my career on risk management, digital forensics, and exploitation analysis. The specialty areas that appeal to me the most would be exploitation analysis because I find it interesting to learn about… Continue Reading →

Hello World!

This is a post. Use posts to update your blog.

Newer posts »

© 2025 nadiaeportifoliocyse201s — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑