ODU Logo

Johnathan Mack

E-Portfolio

Tag CYSE-201S

Journal 15

Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. I found Davin Teo’s journey into digital… Continue Reading →

Journal 14

Andriy Links to an external site.SlynchukLinks to an external site. Links to an external site.has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why… Continue Reading →

Journal 13

A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. … Continue Reading →

Week 12 Journal

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. The sample data breach notification aligns with economic theories such as… Continue Reading →

Week 11 Journal

Read this and write a journal entry summarizing your response to the article on social cybersecurity  https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/bLinks to an external site. Reading the article on social cybersecurity really made me think about how our online interactions can impact our safety…. Continue Reading →

Week 10 Journal

Complete the Social Media Disorder scaleLinks to an external site..  How did you score?  What do you think about the items in the scale?  Why do you think that different patterns are found across the world? I scored a two out… Continue Reading →

Week 8 Journal

Watch this video and pay attention to the way that movies distort hackers. After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity After watching the video, it’s important to take… Continue Reading →

Week 7 Journal

Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s). I used this picture because it can act as a security briefing. As we… Continue Reading →

Week 6 Journal

Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? The primary concern with phishing scams is the creation of fake websites. One such example is… Continue Reading →

Week 5 Journal

Review the articles linked with each individual motive in the presentation page or Slide #3.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). … Continue Reading →

« Older posts

© 2025 Johnathan Mack — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑