ODU Logo

Haleem Mitchell

Student Name

Week 15 Journal Entry

Davin Teo’s pathway into digital forensics is an interesting example of how careers in this field can appear unexpectedly. Initially hired as an accountant, Teo found himself drawn to information technology, which led him into the world of digital forensics…. Continue Reading →

Career Paper: Ethical Hacking

The Career There are a lot of career opportunities in the cybersecurity field, and one that really stands out is ethical hacking. Ethical hackers are responsible for testing an organization’s systems to find any security weaknesses. They are basically known… Continue Reading →

Week 12 Journal Entry

Andriy Slynchuk describes several internet activities that can be considered illegal, with five standing out as the most serious. First, collecting information about children is a major concern, as it violates privacy laws and exposes minors to harmful content. Children… Continue Reading →

Week 11 Journal Entry Part 2

The article “Hacking for Good” by Kiran Sridhar and Ming Ng talks about bug bounty programs, where companies pay hackers to find problems in their computer systems. The authors used data from HackerOne to show that when companies offer bigger… Continue Reading →

Week 11 Journal Entry

The SAMPLE DATA BREACH NOTIFICATION letter can be explained using two economic theories and two social science theories.             Economic theories: Social science theories:

Article Review 2

Article Review #2: The Need for a Cybersecurity Education Program for Internet Users with Limited English Proficiency: Results from a Pilot Study Social Science Principals This article relates to the principles of objectivity and parsimony. The objectivity refers to the… Continue Reading →

Week 10 Journal Entry Part 2

A cybersecurity analyst’s job goes beyond just technical skills; it requires effective communication, teamwork, and problem-solving abilities. Being able to explain complex issues, like phishing threats, to people who do not understand cybersecurity is crucial. Analysts also need to manage… Continue Reading →

Week 10 Journal Entry

The article “Social Cybersecurity: An Emerging National Security Requirement” by Lt. Col. David M. Beskow and Kathleen M. Carley, PhD, talk about the growing threats of cyber tools used to manipulate people’s beliefs and behaviors. With more people getting information… Continue Reading →

Week 9 Journal Entry

Upon completion of the Social Media Disorder Scale, I did not meet the requirements to be diagnosed as a disordered social media user. I only scored one out of nine. The one question I answered yest to is that I… Continue Reading →

Week 8 Journal Entry

The media influences our understanding of cybersecurity in many ways. We are constantly flooded with cyber-attacks, data breaches, and hacking incidents through the news, social media, and even word to mouth. One thing the media does right is that it… Continue Reading →

« Older posts

© 2025 Haleem Mitchell — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑