ODU Logo

Katrina Borja

Student Name

entry #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Overall, cyber-attacks are becoming more common, so businesses must educate themselves on cybersecurity and cyber-policy in order to protect themselves. Given the short… Continue Reading →

entry #12

How does cyber technology impact interactions between offenders and victims? Throughout the years, cyber technology has been evolving in our daily routines. The more developed our cyber technology becomes, the more illegal hackers attempt to breach our systems, resulting in… Continue Reading →

entry #11

 What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? When criminal activity is carried out on the internet and through the use of technology, this is referred… Continue Reading →

entry #10

How do engineers make cyber networks safer? Cyber networks are susceptible to any situation that would involve hacking or DDoS. It is critical to ensure that networks run smoothly in order to ensure the safety of the company to which… Continue Reading →

entry #9

Describe three ways that computers have made the world safer and less safe. Technology has been evolving around the world throughout the years. Computers have made the world safer in a variety of ways. Computers have enabled the development of… Continue Reading →

entry #8

How can you tell if your computer is safe? I think the only way to know your computer is completely secure is if you recently had its hard drive completely wiped, disconnected from the Internet, completely turned off, and unplugged…. Continue Reading →

entry # 7

What are the costs and benefits of developing cybersecurity programs in business? The costs and benefits of developing a cybersecurity program within a business can vary depending on a number of factors. It is recommended that small businesses should develop… Continue Reading →

entry #6

How has cyber technology created opportunities for workplace deviance? Workplace deviance refers to intentional, malicious attempts to sabotage an organization by causing problems at work. It is also defined as voluntary behavior that violates significant norms and endangers the well-being… Continue Reading →

free write- entry #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.  Create an application that allows a system to encrypt data at any time. Yacht software that enables the boat to drive and navigate without… Continue Reading →

entry #2

Select four other majors offered by ODU and explain how those majors relate to cybersecurity. One of the majors that I chose that is related to cybersecurity is criminology. Criminology is the study of the criminal justice and law enforcement… Continue Reading →

« Older posts

© 2025 Katrina Borja — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑