September 27th 2022 Journal 5#

Prompt: Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  Create new security policies for a local school.YouTube cyber security analyst, discover cyber threats on the platform. Building a stronger password policy for a law firmEncrypting data for a birthday clown federation. (I’m just trying to be funny,…

Journal 4# September 21st

Prompt: Compare cyber security risks in the U.S. and another country. Response: Cyber security practices, risks, and understanding differs across the globe. Some countries have relaxed policies regarding their data, whilst others take extreme, and sometimes overbearing measures to ensure no information leaks outside their borders. Nigeria is one of the more interesting countries to…

Journal 3# September 14th

 Prompt: Describe four ethical issues that arise when storing electronic information about individuals. With the advent of the internet and the increase of online commerce, it has become a necessity that companies and institutions must store patron, staff, and user data. There are four main conundrums that arise with this data storage, however. The first…

Journal 2# September 8th, 2022

Prompt: Select four other majors offered by ODU and explain how those majors relate to cybersecurity. Answer: With Cyber Security, there are multiple ways to approach the field. Many have dubbed cyber security “interdisciplinary”, meaning that it involves more than one distinct discipline. There are four examples of majors at ODU that reinforce this interdisciplinary…

Journal 1# August 30th, 2022

Prompt: Why are you interested in cybersecurity technology? Answer: Personally, I’ve always had some level of interest in computer science. Before even getting into computer hardware, it impressed me how computer technicians were able to solve almost any computer issue with ease. As I got more and more into the field of computers, the most…