ODU Logo

Anthony Garcia Urena

E-portfolio Entry #13

In today’s world, the development of cyber-policy and infrastructure is critical to ensuring the security and stability of our digital systems. However, the constantly evolving nature of technology and the “short arm” of predictive knowledge make it challenging to approach… Continue Reading →

E-portfolio Entry #12

Cyber technology impacts interactions between offenders and victims in countless ways like staying anonymous online while they stalk or harass a victim, facilitating cyber harassment and stalking by giving access to millions of online users, and threatening individuals with violence…. Continue Reading →

E-portfolio entry #11

There is much overlap between cybercrime and criminal justice; however, there are three main areas where a significant amount of overlap occurs. Whenever someone hacks into a server, network, or system when a suspect of a cybercrime is prosecuted, and… Continue Reading →

E-portfolio Entry #10

As cyber threats continue to evolve and become increasingly sophisticated, ensuring the safety of cyber networks is a top priority for engineers. Engineers employ a variety of techniques and strategies to safeguard networks against cyber attacks, including the use of… Continue Reading →

E-portfolio Entry #9

Computers have simultaneously made our world safer and less safe because more information is available online and accessible through computers, computers can be hacked, and crime can be tracked digitally. For instance, nowadays there are 5 million terabytes on the… Continue Reading →

E-portfolio Entry #8

There are countless ways to ensure security on your computer, you can use a VPN when on a public network or ignore phishing emails. However, the three most effective ways you can tell that your computer is safe is by… Continue Reading →

E-portfolio Entry #7

There are many costs and benefits of developing cybersecurity programs in business, but none are as important as the prevention of data breaches, the money that is spent on training personnel on the best and most up-to-date cybersecurity practices, and… Continue Reading →

E-portfolio entry #6

Cybersecurity technology has created opportunities for workplace deviance in many ways like allowing employees to bring their device and connect it to a network, giving access to sensitive data, and enabling employees to have credentials to access their systems and… Continue Reading →

e-portfolio entry #5

Creating an app that tracks weight loss and has paid subscriptionYouTube videos about cybersecurity Brand marketing cybersecurity lessons E-commerce, selling cybersecurity lessonsRansomware defense, lessons about how to defend against ransomware could be givenScripting classesEnterprise job, you can obtain a position… Continue Reading →

e-portfolio entry #4

Various cybersecurity attacks can be performed by hackers to enter a network, computer, or system like ransomware, malware, DDoS, phishing, or brute force attacks. In the U.S. one of the most common attacks is known as phishing where emails are… Continue Reading →

e-portfolio entry #3

Four ethical issues arise when storing electronic information about individuals. First, the information’s integrity can be compromised if a Cybersecurity incident were to occur like malware, ransomware, a DDoS attack, or a data breach. Any of these cyber attacks can… Continue Reading →

e-Portfolio Entry #2

1. Computer Science is related to cybersecurity because all Cybersecurity applications are programs built and maintained by Computer Science. For instance, Red Hat was made using python. Secondly, Cybersecurity is a subset of computer science instead of creating new programs… Continue Reading →

Why I am interested in Cybersecurity Technology

         I am interested in cybersecurity technology because with a degree in Cybersecurity I will be capable, equipped, and knowledgeable about how to defend digital networks, company assets, and systems from cyberattacks from hackers which can cost companies… Continue Reading →

© 2025 Anthony Garcia Urena — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑