ODU Logo

Cybersecurity ePortfolio

Nathan Jimenez

Journal 14

Andriy .Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. The five most serious out… Continue Reading →

Journal 13

A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. … Continue Reading →

Journal 12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different psychological social sciences theories relate to the letter. The two economic theories that relate to the letter is Information Asymmetry and Negative… Continue Reading →

Journal 11

Watch this video  As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0 , think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation. In the video, the role of a… Continue Reading →

Journal 10

Read this and write a journal entry summarizing your response to the article on social cybersecurity https://www.sciencedirect.com/science/article/pii/S2451958825000831 The article “A Survey of Social Cybersecurity” provided a detailed overview of how malicious people exploit social networks and multiple online platforms to… Continue Reading →

Journal 9

Watch this Video: Social media and cybersecurity Complete the Social Media Disorder scale  or please find the attachment here: Social Media Disorder Scale.pdf How did you score?  What do you think about the items in the scale?  Why do you think that different… Continue Reading →

Journal 8

Watch this video and pay attention to the way that movies distort hackers. Scientists Rate 65 Scenes from Movies and TV | How Real Is It? | Insider – YouTube The Media influences cybersecurity understanding by defining the threats and… Continue Reading →

Journal 6

Watch this video: https://www.youtube.com/watch?v=ueWCTHV96eQ&t=2s and pay attention to what the biggest risk of cyber threats are.  After watching the video, post an entry describing what you think about the “human firewall”. The video emphasized that the biggest risk in cybersecurity… Continue Reading →

Journal 5

Review the articles linked with each individual motive in slide/page #3.  Rank the motives from 1 to 8 as the motives that you think make the most sense (being 1) to the least sense (being 8).  Explain why you rank… Continue Reading →

Journal 4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.The first need, Physiological Needs, which are the basic for human… Continue Reading →

« Older posts

© 2026 Cybersecurity ePortfolio — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑