ODU Logo

EPortfolio

Alex Easting

Category Uncategorized

Journal Entry 10

The Russian propaganda apparatus. long directed at its society and tho satellite states of the former Soviet Union is now aiming at targets abroad, in 2013, Gen. Valery Gerasimov identified information warfare as an essential aspect of Russian warfare going… Continue Reading →

Journal Entry 9

1. Regularly found that you can’t think of anything else but the moment you will be able to use social media again? Yes/No (Preoccupation). 2. Regularly felt dissatisfied because you want to spend more time on social media? Yes/No (Tolerance)…. Continue Reading →

Journal Entry 8

Recently, I’ve realized the profound impact the media has on shaping our perceptions of cybersecurity. The media often implies the sense of urgency and fear surrounding cyber threats through sensational headlines and dramatic narratives. This can lead to heightened awareness,… Continue Reading →

Journal Entry 7

Image three: The memo is when you successfully catch a hacker who these stealingSomeones information, in the picture, the individual sits in a chair with a laptop, smiling at the camera. I believe in the individual’s head; he is considering… Continue Reading →

Journal 6 Entry

The first-takes website I found was a website pretending to be Amazon. I figured this website was fake because & was misspelled when I looked at how Amazon was spelled, Bo “amazon* on the URL. The correct way to spell… Continue Reading →

Journal Entry 5

I would rank entertainment crimes as number 7 on the list because entertainment crimes are not as severe as the other crimes on the list. Political crimes are number 3 because they are more severe than most, and policies is… Continue Reading →

Opportunities for Workplace Deviance

The inherent intricacy and confidentiality of cyber technology have created a perfect environment for workplace misconduct. The fact that it permits unauthorized access to personal information contributes to deviance. Employees with technical expertise may breach security protocols to obtain confidential… Continue Reading →

DISCUSSION BOARD: Protecting Availability

Cloud-Based Redundancy: This type of redundancy and disaster recovery uses cloud computing services to replicate important systems and data across several geographical locations, making them resilient to localized outages and guaranteeing continuous availability Business Continuity Planning: Creating and evaluating plans… Continue Reading →

Career Paper

Christian EastlingInformation Security Specialist IntroductionAn information security specialist has responsibilities that are essential to the security ofan organization’s computer system and network. Security specialists find security issues in anorganization’s systems using prior knowledge and programs, setting security standards, andteaching management… Continue Reading →

Article Review 2

Christian EastlingArticle Review 2Digital Criminal Investigations in the Era of Artificial Intelligence AbstractArtificial intelligence (AI) has been thoroughly incorporated into digital criminal investigations with theaid of related methodologies, implications for the law, and its overall effect on the justice system…. Continue Reading →

« Older posts Newer posts »

© 2025 EPortfolio — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑