ODU Logo

Haleem Mitchell

Student Name

Page 2 of 2

Week 7 Journal Entry

*Me when i win another new iPhone by clicking on a link* *”Oh man I love how free and open public WiFi is!”* *When you realize “Password1” wasn’t the best password choice* Each of these memes relate to human-centered cybersecurity…. Continue Reading →

Week 6 Journal Entry

Fake websites vs. Real websites Pay-pail.com                          paypal.com TiffanyCoShop.com               Tiffany.com Piloltd.com                             Amazon.com There are many ways to spot a fake website. If you already know the name of the original website, then a fake website can be spotted easily if you… Continue Reading →

Week 5 Journal Entry

The motive I rank number 1 is political. I am not a political person, so it seems very pointless to me. The motive I rank 2 is recognition. People say all publicity is good publicity, but being recognized for doing… Continue Reading →

Article Review #1: Adapting cybersecurity practice to reduce wildlife cybercrime

Social Science Principals Some principles that this article relates to is objectivity and parsimony. The objectivity in this article refers to the fact that the researchers should not promote their opinion when it comes to the punishment of the cybercrime… Continue Reading →

Week 4 Journal Entry

Maslow’s hierarchy of needs suggest that all humans have needs that exist on a hierarchy. The first level is physiological needs which includes food, water, warmth, and rest. I use technology all the time to order food online to meet… Continue Reading →

Week 3 Journal Entry

The website PrivacyRights.org is a site that can help researchers study the causes and effects of data breaches. Researchers can use the data breach notification to understand each state’s definition of a breach and what laws are in place as… Continue Reading →

Week 2 Journal Entry

How do the principals of science relate to cybersecurity? There are six principals, and they all relate in some way. Some principals are easier to relate to cybersecurity than others. Determinism can be used to describe a company that wants… Continue Reading →

Week 1 Journal Entry

The NICE Framework is a resource that establishes a common ground that describes cybersecurity work no matter where you work at. I would be most interested to working in the implementation and operation of cybersecurity. This area is where I… Continue Reading →

Newer posts »

© 2025 Haleem Mitchell — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑