ODU Logo

Muriel Locke

Student Name

eportfolio 13 How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

The short arm of predictive knowledge refers to the idea that there is no way to know the consequences that will be faced in the future for current actions. Ultimately, the cyber policy aims to reduce risk within engineering systems,… Continue Reading →

eportfolio 10 How do engineers make cyber networks safer? 

Systems security engineering utilize math, science, and principles of measurement to maintain proper security and network safety.  Engineers make cyber networks safer by establishing trustworthy systems and components and addressing system failures. According to the “Multidisciplinary Approach in the Engineering… Continue Reading →

eportfolio 8 How can you tell if your computer is safe?

There are many ways to keep a computer safe and monitor the effectiveness of safety measures, however, there is no full guarantee at all types despite vigilance. With the creation of new devices new means of protection have accompanied them… Continue Reading →

eportfolio 12 How does cyber technology impact interactions between offenders and victims?

Cyber technology impacts interactions between offenders and victims, because oftentimes offenders will use technology as another means of unwanted communication with the victim. With technology and communication advancements cyberstalking and cyber harassment have come into existence and caused problems all… Continue Reading →

eportfolio 11. What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

Cybercrime is considered any illegal act that violates criminal law within cybertechnologies. A criminal justice approach is taken to be sure of legal definitions of crime. There are several approaches to take when defining various types of cybercrime, six include… Continue Reading →

eportfolio 9 Describe three ways that computers have made the world safer and less safe

There are several ways in which computers have made the world both more safe and dangerous. Computers have significantly increased overall convenience for individuals and companies across the world, but have also created more opportunities for criminals to carry out… Continue Reading →

eportfolio #7-what are the cost and benefits of developing cybersecurity programs in business?

Like anything else, there are both costs and benefits to developing cybersecurity programs in business. Cybersecurity is in high demand and as a result, many cybersecurity businesses have been created like: Cyber operations, cybersecurity consulting, cybersecurity products/vendors, insurance, and training…. Continue Reading →

post 6 How has cyber technology created opportunities for workplace deviancepost

Cyber technology has created opportunities for workplace deviance because it is another way employees can violate the law or put themselves and or the company at risk. While there have been advancements in measures to protect businesses and individuals they… Continue Reading →

eportfolio 5 Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. 

Create an app that rates software.Yacht GPS software that is secureBootcamps for cybersecurity programs gRaphic designer professionSecurity policy creaters -protect organizations Ethical hacker professionCreate coordinate assistance programsUse education/certificates to qualify for higher paying jobs Research vulnerabilityInvest in cybersecurity stocksTechnology-thinking like the enemy to… Continue Reading →

journal 4 – Compare cybersecurity risks in the U.S. and another country

The International Journal of  Cyber criminology reported from Symantec about the cybercrime differences between various countries with the US being at the top. It was found that spam emails were one of the most common forms of attacks for cyber… Continue Reading →

« Older posts

© 2025 Muriel Locke — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑