ODU Logo

Aron Jemaneh

e-Portfolio

Page 2 of 3

Week 8 Entry (CYSE201S)

Watching movies is one of my favorite things to do and I watch them all the time. One thing Hollywood likes to do is add certain tropes and stereotypes to movies. One of those tropes being super intense hacking scenes… Continue Reading →

Week 6 Entry (CYSE201S)

When scrolling through and clicking on websites it is important that you know what you are clicking on. Fake websites are big ways that hackers can get access or see things on your device through malware. Checking and making sure… Continue Reading →

Week 5 Entry (CYSE201S)

If I were to rank all of these motives in order of what I think makes the most sense it would be the following. Political, Revenge, For Money, Multiple Reasons, Recognition, Entertainment, and for Boredom. The reason I put politics… Continue Reading →

Week 4 Entry (CYSE201S)

Psychological Needs: It’s unfortunate that I say this but people like me that are in my generation essentially survive off of our phones. I have tried going days without using my phone but always end up failing because of how… Continue Reading →

Week 3 Entry (CYSE201S)

The PrivacyRights.org website provides a multitude of information in regards to many different types of breaches. With issues such as spam messages and junk mail this website also has information on how to reduce and avoid them. It also includes… Continue Reading →

Week 2 Entry (CSYE201S)

There are many aspects in which cybersecurity and the principles of science relate to each other. In both fields require they need to review and analyze data and statistics whether it be from experiments or from cyber attacks. Going back… Continue Reading →

Week One Entry (CYSE201S)

As of now I am uncertain exactly what field of cybersecurity I want to do in the future. However, after looking at the NICE Workforce Framework, it has helped me decide and find interest in the types of areas I… Continue Reading →

7th Entry

With the advancement of technology, crime has also developed alongside it. Crimes like identity fraud, hacking, phishing, and scamming were introduced and some advancing more. There have also been other forms where they might not be crimes as serious, they… Continue Reading →

6th Entry

Engineers play a very crucial role in the making of cyber networks safer whether it be the design, implementation, or doing maintenance of security measures. Engineers conduct risk assessments and analysis to identify and potential risks to a cyber network…. Continue Reading →

5th Entry

A computer is a very important peace of technology that many people around the world use on a daily basis. Whether I be for work or school a computer will help you get whatever you need to do. However not… Continue Reading →

« Older posts Newer posts »

© 2025 Aron Jemaneh — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑