ODU Logo

EPortfolio

Alex Easting

Write-Up

Discussion Board

Journal Entry 4

Physiological Needs- When it comes to meeting basic physiological needs like food, water, and shelter, technology is crucial.  Safety Needs-By offering access to emergency services and security measures, technology helps meet safety-related needs. ve and  Belongingness Needs- To satisfy the need… Continue Reading →

Journal Entry 3

Any event that leads to unauthorized access to computer data, applications, networks, or devices is considered a security breach. Information is accessed without authorization as a result. They can use this information to ensure they don’t violate people’s rights. This… Continue Reading →

Journal Entry 1

I’m not completely sure what I would want to focus on in my career in Cybersecurity, but I think I would lean toward the Investigating side of it. As a young kid, I’ve always enjoyed solving mysteries or problems. It… Continue Reading →

Article Review 2

Christian EastlingArticle Review 2Digital Criminal Investigations in the Era of Artificial Intelligence AbstractArtificial intelligence (AI) has been thoroughly incorporated into digital criminal investigations with theaid of related methodologies, implications for the law, and its overall effect on the justice system…. Continue Reading →

Journal Entry 14

Internet users may engage in various activities that are considered illegal. These can range from downloading and distributing copyrighted material without permission to engaging in cyberbullying, identity theft, phishing scams, and participating in illegal online markets. The five most serious… Continue Reading →

Journal Entry 13

Orasing upon a comprehensive data test of bug bounty programs, we removed marry or the sources of endogeneity plaguing research in the crowdsourced cybersecurity self and identified many of the factors that indigence the quantity of valid vulnerability Imports bug… Continue Reading →

Journal Entry 12

Economic theories such as rational choice theory and information asymmetry could bol relevant to a data breach notification letter. Rational Choice Theory posits that individuals decide by weighing the costs and benefits to maximize their advantage. Here, companies might respond… Continue Reading →

Journal Entry 11

The role of a cybersecurity analyst intersects significantly with social behaviors, as these professionals are tasked with safeguarding information systems from throats that originate from human actions. Whether through malicious intent, such as hacking and phishing, or inadvertent risks, like… Continue Reading →

« Older posts

© 2025 EPortfolio — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑