Alexander TrevinoProfessor UmphletCYSE201SDue: July 14, 2024Module 10 Journal Entry 1The video about the cybersecurity analyst job highlights several important social themes. Trustand responsibility are key, as analysts protect sensitive information and keep digital systemssecure. This helps maintain public confidence in… Continue Reading →
Alexander TrevinoProfessor UmphletCYSE201SDue: July 7, 2024MODULE 9 JOURNALOn the Social Media Disorder scale, I scored 1 “yes” and the rest “no.” I have had issueswith limiting my time on social media, particularly on my phone. I understand the questions onthe… Continue Reading →
Alexander TrevinoProfessor UmphletCYSE201SDue: July 7, 2024MODULE 8 JOURNALHacking has been part of computing since its inception, but movies and TV shows havesignificantly shaped public perception of it. Early films like “WarGames” (1983) and “Hackers”(1995) dramatized hacking with unrealistic scenarios. “WarGames”… Continue Reading →
Module 6 Journal EntryAlexander Trevino6/23/2024It’s interesting to see real hackers explain the biggest misconceptions about hacking thatwe see in movies. I’ve watched movies like “Swordfish” and always thought hacking was reallycool and flashy. In “Swordfish,” the main character hacks into… Continue Reading →
Annotated BibliographyAlexander Trevino6/23/2024Firat, I., & Khraisat, A. (2021). Cyber risk and cybersecurity: A systematic review of dataavailability. The Geneva Papers on Risk and Insurance – Issues and Practice. Retrieved fromhttps://link.springer.com/article/10.1057/s41288-021-00229-4Annotation: This article reviews cybersecurity datasets and their importance inpreventing cyberattacks…. Continue Reading →
Module 5 Journal EntryAlexander Trevino6/14/2024Many cybercriminals have multiple reasons which makes it my number one. The mix ofmotivations, including financial gain, political beliefs, and the desire for recognition. Thiscombination reflects the complex nature of human behavior and motivations, making it… Continue Reading →
Alexander TrevinoDue: 5/19/2024CYSE 201S Summer 2024Journal Entry 1Below is the list of the NICE Workforce Categories ranked in the most interesting order to me.
Journal 4 Module EntryAlexander TrevinoJune 9, 2024 Maslow, A., created the Maslow Hierarchy of Needs, a pyramid illustrating the importance of various human needs. Technology has become increasingly important as it intertwines with everyday life. The first and base level… Continue Reading →
Alexander TrevinoDue: 6/2/2024CYSE 201Module 3 Journal Entry Researchers can use the information on PrivacyRights.org in several ways to study databreaches. They can analyze trends and patterns in breaches to understand common vulnerabilitiesand impacts on individuals and organizations. Detailed case studies… Continue Reading →
Alexander TrevinoDue: 5/26/2024CYSE 201S Summer 2024Journal Entry 2 Relativism is the concept that events or phenomena are interconnected, which is evidentin cybersecurity as each piece of code affects the next, linking them together. Objectivityinvolves maintaining an open mind and basing… Continue Reading →
Alexander L. Trevino Reliable and hardworking gentleman committed to completing every job quickly, efficiently, and safely with minimal oversight. Contact InformationNorfolk, VA832-917-9183atrev004@odu.edu Objective Cyber Security major at Old Dominion University with a diverse background in logistics, sales, and military service…. Continue Reading →
Welcome to my website! My name is Alexander Trevino, and I am currently a Cyber Security major at Old Dominion University (ODU). I have previously attended Houston Community College and Guilford Community College. Early Life and Education I was born… Continue Reading →
Engineers’ jobs are to make cyber networks safer by designing developing, and implementing various measures to safeguard networks from threats. They use encryption algorithms and authentication protocols to protect sensitive data from unauthorized access and ensure secure communication channels. By… Continue Reading →
Computers are powerful machines that provide access to vast amounts of information with just a few clicks. However, along with the great possibilities, there are also risks of negative outcomes. One major concern is the threat of hacking, where unauthorized… Continue Reading →
Developing cybersecurity programs in business can provide a multitude of benefits while also entailing several costs. In today’s age, protection against cyber threats is a critical consideration for companies. The growth of hackers necessitates that businesses be prepared for potential… Continue Reading →
© 2025 Alexander Trevino — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑