My name is Hamza Safdar, I am a sophomore majoring in cybersecurity engineering at ODU. Experience: TRAINING & COMPUTER SKILLS LANGUAGES Relevant Coursework WORK EXPERIENCE Cyber Analyst Intern, Great Bridge High School January 2022 – June 2023 Cybersecurity Student, Chesapeake… Continue Reading →
The speaker presents an intersection between accounting and technology that challenges what is typically assumed. As an accountant who has transitioned into digital forensics, his experience shows how social science skills play a role in his technical field. What stands… Continue Reading →
Hamza Safdar Title: The Role of Social Science in Cybersecurity Consulting Introduction Cybersecurity consulting is a crucial field that bridges the gaps between the technical needs and the organizational needs of a company. This paper aims to examine how… Continue Reading →
According to the article by Andriy Slynchuk, the five most serious online crimes are: 2. Cyberbullying and trolling can cause emotional distress and lead to criminal charges. 3. Identity fraud and impersonation where you use someone else’s information without their… Continue Reading →
Article Review #2 Hamza Safdar Old Dominion University CYSE201S Article Review #2: “What is Cyber Criminology? Who is the Founding Father? Who coined the Term?” Source: https://www.cybercrimejournal.com/ Introduction This review aims to examine the article “What is Cyber Criminology? Who… Continue Reading →
Bug bounty programs are an effective measure in cybersecurity which allows ethical hackers to identify vulnerabilities for a sum of money. The literature review shows that bug bounties are effective and cost efficient ways to deal with vulnerabilities. Compared to… Continue Reading →
Information Asymmetry is a theory that relates to the data breach letter. This theory suggests that one party in economic transactions has better information than the other. In this case glashwasherparts.com had more information about the data breach than the… Continue Reading →
Throughout the presentation, the speaker addresses social themes and graveyard shifts while suggesting that single individuals without any family commitments are best suited for those roles. The speaker also compares fast paced cities such as New York to more manageable… Continue Reading →
The main takeaways from the article is that social cybersecurity is a separated field that works differently from traditional cybersecurity. Social cybersecurity involves people hacking other people with technology with the focus on manipulating beliefs and behaviors for a political… Continue Reading →
© 2025 Hamza Safdar — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑