ODU Logo

Category Uncategorized

IDS493 ELECTRONIC PORTFOLIO PROJECT

Introduction: I have always worked diligently throughout my academic terms. After being accepted to Tidewater Community College (Portsmouth, VA) fall 2020 term, I decided to convert my free time into study time. It was one of the best decisions I… Continue Reading →

Reflection Paper for Linux for Cybersecurity

The lessons of this course was tremendous and extremely educational. I was able to learn a lot about Linux and how it can be utilized in cybersecurity. I really enjoyed all the classes and assignments as doing cybersecurity is quite… Continue Reading →

Journal entry #4

What are the costs and benefits of developing cybersecurity programs in business? Cyber-attacks and data breaches can cost a business millions of dollars depending on how serious the attack is. Depending on what information was compromised can determine the cost… Continue Reading →

Journal entry 6

1. How do engineers make cyber networks safer? It’s no surprise that faulty software often leaves networks vulnerable to malware, spyware, adware, phishing and more. A security engineer analyzes computer networks, ensures they’re running securely, and tries to foresee possible security… Continue Reading →

Journal entry 5

1.  How can you tell if your computer is safe? Ways in which one can know if the computer is safe is as mentioned below: 1) Testing the settings and configuration 2) Updating the browser plugin and keeping the browser updated… Continue Reading →

Journal entry #3

How has cyber technology created opportunities for workplace deviance? Deviance is depicted as “the reality or condition of withdrawing from common or acknowledged norms, particularly in friendly or adult conduct.” Work place aberrance can happen effectively in the digital innovation… Continue Reading →

Journal Entry #2

Describe four ethical issues that arise when storing electronic information about individuals. The four ethical issues that arise when storing electronic information about individuals are privacy, security, accuracy and access. Keeping electronic records of people can lead to the following… Continue Reading →

Journal Entry #1

Why are you interested in cybersecurity technology? I have always been more of a hands-on learner. That is precisely why I chose cybersecurity as my major. As an adolescent, observing the advancements in technology, I came to the conclusion there… Continue Reading →

© 2025 — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑