ODU Logo

Eden Kidane

Student Name

Page 2 of 3

Spotting Fake Websites: Key Differences from Real Ones

To identify fraudulent websites, search for crucial indicators such as poor design, suspicious URLs, or sloppy grammar. A phony website, for example, may use a URL such as “amaz0n-shop.com” rather than the real “amazon.com.” Fake websites frequently use badly designed… Continue Reading →

What Fuels Cybercrime?

After reviewing the articles related to each unique motive for cybercrime, I considered them according to their believability and impact. First, money appears to be the most natural incentive, given financial gain is the primary motivator for many large-scale cybercrimes… Continue Reading →

Connecting Maslow’s Hierarchy of Needs to My Digital Experiences

Maslow’s Hierarchy of Needs can simply be applied to my technological experiences. Physically, I utilize technology to access food delivery applications and health-tracking equipment, ensuring that fundamental demands like nutrition and exercise are satisfied. For security, I use online banking… Continue Reading →

Publicly Available Data Breach Information: How Researchers Utilize It for Breach Analysis

Researchers can use data from PrivacyRights.org to investigate data breaches by examining different trends and patterns in privacy violations. The website provides detailed information on many types of breaches, including those caused by hackers, credit/debit card theft, lost or stolen… Continue Reading →

How the principles of science relate to cybersecurity.

Science elements including observation, hypothesis, experimentation, and analysis are crucial to the discipline of cybersecurity. Cybersecurity employs similar techniques to comprehend, identify, and address risks and vulnerabilities, just as science does to comprehend natural phenomena through methodical inquiry. Observation is… Continue Reading →

The NICE Workforce Framework.

The National Initiative for Cybersecurity Education (NICE) Workforce Framework offers a structured method for defining and organizing the roles and responsibilities in the cybersecurity career. It divides the workforce into several categories, specialties, and job roles, each with its own… Continue Reading →

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? 

The growth of cyber-policy and infrastructure is a complicated process that necessitates a complex approach, especially given the “short arm” of predictive information in the ever-changing technological and cybersecurity context. Because of the rapid speed of technological innovation, it is… Continue Reading →

How does cyber technology impact interactions between offenders and victims?

The development of cyber technology has had a significant impact on how crime is perceived and how offenders and victims interact. The influence of technology on crime and victimization is complex, ranging from the creation of new types of offenses… Continue Reading →

What is the overlap between criminal justice and cybercrime?

The growing digital connectivity of our society has led to a greater crossover between cybercrime and criminal justice. The changing face of cybercrime intersects with traditional criminal justice disciplines including criminology, legal studies, and law enforcement, requiring a multidisciplinary approach… Continue Reading →

How do engineers make cyber networks safer?

Engineers are essential in enhancing the security of cyber networks by utilizing their technical skills, creative thinking, and strategic planning. Their work is crucial for reducing vulnerabilities, bolstering defenses, and addressing changing cyber threats. Cyber networks are built on strong… Continue Reading →

« Older posts Newer posts »

© 2025 Eden Kidane — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑