ODU Logo

Casey Carpenter

B.S. in Computer Science and B.S. in Cybersecurity Dec 2021

How should we approach the development of cyber policy and infrastructure given the “short arm” of predictive knowledge & how does cyber technology impact interactions between offenders and victims?

The “short arm” of predictive knowledge when it comes to cyber policy and infrastructure makes it tricky to decide how to approach development ideas. Due to the rapid changes in technology, this field of development of cyber policy requires an… Continue Reading →

Describe three ways that computers have made the world safer and less safe & how do engineers make cyber networks safer?

Computers, without a doubt, have completely changed the way of living for every person in every country with them. Computers, in some ways, have made life safer, and in some other ways, less safe. The first thing I think about… Continue Reading →

What are the costs and benefits of developing cybersecurity programs in business? How can you tell if your computer is safe?

There are so many benefits for developing cybersecurity programs in business. In the world we now live in, cybersecurity is no longer a benefit, but a necessity. Every company’s most sensitive information, their data, is vulnerable to hacks. Cybersecurity programs… Continue Reading →

Free Write: Letters of Cybersecurity

Use the letters of the word Cybersecurity to list legal ways to make money in cybersecurity Create an application that teaches companies about basic types of security Yank at every opportunity to add to your resume, as this will help… Continue Reading →

How has Cyber Technology Created Opportunities for Workplace Deviance?

Remote. Working. Cyber technology has completely changed the way we can get work done. 10-20 years ago, everyone was expected to get a job that requires leaving your house and driving to work. Now, many jobs are offering remote work,… Continue Reading →

Describe Four Ethical Issues that Arise When Storing Electronic Information about Individuals; Compare Cybersecurity Risks in the US and in Another Country

Four ethical issues that arise when storing electronic information include: Privacy concerns. The security team has to not use the information they store about individuals for malicious intent. The intent has to only be for the purpose the individuals want…. Continue Reading →

Googling My Name

After googling my name, there are a few things people will learn about me. First, my Facebook account appears. People can easily find my profile. Next, my image is the first one to appear on Google Images. This image comes… Continue Reading →

How Does Computer Science and Cybersecurity relate to Cybersecurity Technology?

Computer Science and Cybersecurity both directly relate to Cybersecurity technology. Cybersecurity is obvious in that it utilizes all of the cybersecurity technology. An example is Intrusion Detection Systems (IDS). These are set up in systems in companies in order to… Continue Reading →

Hello world!

Welcome to my ePortfolio! Check out the menu above to traverse through my work

© 2025 Casey Carpenter — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑