ODU Logo

Krystian Morgan

Student Name

Entry #13

Welcome Fellow Readers, I will be describing How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? In the last assignment of entry#13. As the cyber-policy and cyber infrastructure are outstandingly important, these… Continue Reading →

Entry #12

Welcome Fellow Readers, I will be answering how does cyber technology impact interactions between offenders and victims? For assignment eportfolio entry number twelve. Nowadays, the newer generation of the internet has opened many opportunities to cyber stalking and cyber harassment…. Continue Reading →

Entry#11

Welcome Fellow Readers, I will be answering ePortfolio Entry #11. The question is, what is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? For those who do not… Continue Reading →

entry #10

Welcome Fellow Readers, I will be answering the following question for entry # 10. The question is how do engineers make cyber networks safer? Engineers make cyber networks and are in constant portfolio on how they can make safer networks… Continue Reading →

entry #9 Three ways and more

Welcome Fellow Readers: I will describe three ways computers have made this world safer and less safe. Computers have made technology in this society way safer in some cases and less safe in some cases. The computer databases have also… Continue Reading →

entry #8 Safe?

Welcome Fellow Readers, I will be explaining how you can tell if your computer is safe and how to keep your computer safe for assignment eportfoilo entry#8. Today there are many ways to know if your computer is truly safe… Continue Reading →

Entry #7 Cost and Benefits

Welcome Fellow Readers, I will be explaining what are the costs and benefits of developing cybersecurity programs in business for ePortfolio entry #7. Network protection projects can carry many expenses and advantages to a business. Allow us first to check… Continue Reading →

Entry #6

Welcome Fellow Readers, I will be describing How has cyber technology created opportunities for workplace deviance for assignment entry #6? What is Cyber technology? Cyber technology is the “field of technology that deals with the development of artificial devices or… Continue Reading →

Entry #5

Create an app that allows encryptionYacht GPS software that is secureBiometric border crossing readings at a better rateEmbezzlement detector that reduces suspicious activityRestoring information as a backupSelf-recognizing threats with easy detection ratesEncrypting confidential information and live activityCreating risk free programsUninstalling… Continue Reading →

Entry#4 COMPARE THEM

Welcome Fellow Readers, In the previous assignment of ePortfolio entry #3 I was instructed to Describe four ethical issues that arise when storing electronic information about individuals. Those four ethical issues were confidentiality, privacy, freedom, and data ownership. First, Confidentiality… Continue Reading →

« Older posts

© 2025 Krystian Morgan — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑