ODU Logo

Rebecca Badu

Student Name

Week 13

Information technology is ubiquitous in the lives of people across the globe. These technologies take many forms such as personal computers, smart phones, internet technologies, as well as AI and robotics. In fact, the list is growing constantly and new… Continue Reading →

Week 12

With the fats growing world of technology, interactions between victims and offenders has evolved to where the offender will probably never get the chance to meet the victim but yet the worst crime can be committed from miles away. Centuries… Continue Reading →

Week 11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Cybercrime is also known as electronic crime. This type of crime encompasses many different types of illegal actions,… Continue Reading →

Week 10

Cyber security engineers protect devices, services, and networks from malicious digital attacks. They also design and implements secure networks and infrastructure to protect from cyber-attacks. A cybersecurity technician is responsible for protecting the networks and systems of an organization against… Continue Reading →

Week 9

How have computers made the world safer? It has expanded the way we are able to access information using the internet. We are able to access online books, images, audio, and videos. With the vast amount of information available through the… Continue Reading →

Week 8

How to tell if my computer is safe is by making sure that software updates are performed, making sure there is not malware on my device. Checking my account passwords which will alert me if any account has a weak… Continue Reading →

Week 7

What are the benefits of cyber security for your business? Protection for your business – cyber security solutions provide digital protection to your business that will ensure your employees aren’t at risk from potential threats such as Adware and Ransomware…. Continue Reading →

Week 6

workplace deviance may include sabotaging computer programs, stealing proprietary information, executing viruses and hacking into private computer space. How cyber technology created opportunities for workplace deviance is the workplace starting from minor misuse and overtime it may escalate to harmful… Continue Reading →

Week 4 Entry

When it comes to the U.S Cyber security is taken very seriously and this country is among the top if not the top when it comes to Cyber security. In Countries such as the United States and France they are… Continue Reading →

Week 3 Entry

With different technologies like cloud storage, there can be major concerns about how someone’s information is stored. When a date breach happens as a result of making a mistake when storing someone’s data, trust is broken and it’s a violation… Continue Reading →

« Older posts

© 2026 Rebecca Badu — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑