ODU Logo

Sydney Perkins

Communications Major

Journal Entry #13

#13: How should we approach the development of cyber-policy and infrastructure, given the short arm of predictive knowledge? The development of cyber-policy and infrastructure is a complex and challenging task, particularly given the “short arm” of predictive knowledge in the… Continue Reading →

Journal Entry #12

#12: How does cyber technology impact interactions between offenders and victims? Cyber technology has had a significant impact on interactions between offenders and victims, particularly in cases of cybercrime. In many cases, cyber technology has made it easier for offenders… Continue Reading →

Journal Entry #11

#11: What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? There is a significant overlap between criminal justice and cybercrime, as cybercrime has become an increasingly prevalent… Continue Reading →

Journal Entry #10

#10 Engineers make cyber networks safer by designing and implementing security measures to protect against cyber attacks. This includes designing secure hardware and software systems, implementing encryption and other security measures, and monitoring networks for potential security breaches. Engineers also… Continue Reading →

Journal Entry #9

There are several ways in which computers have made the world safer; however, there are also many ways in which it has made the world less safe. The first way in which computers have made the world safer is through… Continue Reading →

Journal Entry #8

#8  There are several ways to tell if your computer is safe. One way is by keeping your operating system and software up to date. Regularly updating your operating system and software can help protect your computer from security vulnerabilities…. Continue Reading →

Journal Entry #7

#7 Developing cybersecurity programs in business can have many benefits; however, it can also be costly. While there are several costs and benefits, these tend to be the most significant. One of the benefits of developing cybersecurity programs in business… Continue Reading →

Journal Entry #6

#6 Cyber technology has created a number of opportunities for workplace deviance, as it has made it easier for employees to engage in behaviors that are unethical or illegal. For example, employees can use company resources to engage in activities… Continue Reading →

Journal Entry #5

Consulting services Youtube tutorials Bug Bounty Programs Ethical hacking services Risk assessment services Security software development Education and training Compliance auditing User security training Remote security monitoring Incident response services Threat intelligence services Yellow team testing

Journal Entry #3

#3: Describe four ethical issues that arise when storing electronic info about individuals. There are many ethical issues that can arise when storing electronic information about individuals. This issue is only increasing as the world becomes even more technologically advanced…. Continue Reading →

« Older posts

© 2026 Sydney Perkins — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑