Skip to the content
Search for:
Tech Portfolio
Rhia Dimapelis
Home
About Me
Cybersecurity
CYSE200T
(1) What makes cybersecurity interesting?
(2) Majors offered by ODU and how these majors relate to cybersecurity.
(3) Four ethical issues that arise when storing electronic information about individuals
(4) Cybersecurity risks in the U.S. and other countries.
(5) Legal ways to make money in cybersecurity
(6) How has cybersecurity technology created workplace deviance?
(7) What are the costs and benefits of developing cybersecurity programs in business?
(8) How can you tell if your computer is safe?
(9) Three ways that computers have made the world safer and less safe
(10) How do engineers make cyber networks safer?
(11) What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
(12) How does cyber technology impact interactions between offenders and victims?
(13) How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
CYSE270
(6) File Permissions
(7) Storage Management
(8) Shell Script
(10) Networking Basics
(11) Basic Network Configuration
(12) Advance Networking
(13) System Admin
Contact
Toggle search field
Home
About Me
Cybersecurity
CYSE200T
(1) What makes cybersecurity interesting?
(2) Majors offered by ODU and how these majors relate to cybersecurity.
(3) Four ethical issues that arise when storing electronic information about individuals
(4) Cybersecurity risks in the U.S. and other countries.
(5) Legal ways to make money in cybersecurity
(6) How has cybersecurity technology created workplace deviance?
(7) What are the costs and benefits of developing cybersecurity programs in business?
(8) How can you tell if your computer is safe?
(9) Three ways that computers have made the world safer and less safe
(10) How do engineers make cyber networks safer?
(11) What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
(12) How does cyber technology impact interactions between offenders and victims?
(13) How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
CYSE270
(6) File Permissions
(7) Storage Management
(8) Shell Script
(10) Networking Basics
(11) Basic Network Configuration
(12) Advance Networking
(13) System Admin
Contact
Assignments
PERSONAL IMAGE
Put either a picture or an image representative of yourself here.
BIOGRAPHY
Please write a brief, two-to-three sentence biography here.
© 2026
Tech Portfolio
— Powered by
WordPress
Theme by
Anders Noren
—
Up ↑
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
Accept