ODU Logo

Jordan Vuong

Student Name

Category Uncategorized

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? Entry #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? That is the question being asked today and this post will answer that. To start we will be answering what the “short arm”… Continue Reading →

How does cyber technology impact interactions between offenders and victims? Entry #12

In the modern world everything we do has been changed in some form by the rise of cyber technology. One of the things it has impacted are the interactions between offenders and their victims. With the advent of cyber technology… Continue Reading →

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? Entry #11

Have you ever wondered if there was an overlap between criminal justice and cybercrime? This post will go over all the ways they overlap as well as how they relate to other disciplines in this class. Overlap between criminal justice… Continue Reading →

How do engineers make cyber networks safer? Entry #10

Engineers have many responsibilities they have to tend to. Managing and improving cyber networks to make them safer is one of them. They do this to make sure that the users have maximum security when they access the network. Engineers… Continue Reading →

Describe three ways that computers have made the world safer and less safe. Entry #9

Computers have made a great impact on the world ever since their creation. They have played pivotal roles in the development of many technologies. These technologies can range from things like space travel to recreation and to medical related things…. Continue Reading →

How can you tell your computer is safe? Entry #8

How can you tell your computer is safe? That is a question that has been asked by both those that do not have a computer and those that do. Some might assume that if it looks like it is safe… Continue Reading →

What are the costs and benefits of developing cybersecurity programs in business? Entry #7

There has been a lot of talk about plans for developing cybersecurity programs in business. These plans would have both costs and benefits and this post will discuss them. Cyber attacks on businesses have regularly caused millions of dollars worth… Continue Reading →

How has cybertechnology created opportunities for workplace deviance? Entry #6

Cybertechnology has been a major reason why workplace production has gone up but it also brought some downsides. The one that we will be talking about is how it created more opportunities for workplace deviance. Workplace deviance is defined as… Continue Reading →

Use letters in CYBERSECURITY to list legal ways to make money in cybersecurity. Entry #5

Create a better anti virus program Yahoo cybersecurity Be a white hat hacker E-book site manager Report weaknesses in firewalls Search engine manager Easter egg programmer C++ programmer Understanding what the problem is Ransomware expert Identity theft recovery Tech support… Continue Reading →

Compare Cybersecurity Risks in the U.S. and another Country. Entry #4

The majority of countries in today’s world has cybersecurity in some capacity. The quality of it ranges from pretty bad to pretty good and luckily for us the United States sits in the top five according to a study that… Continue Reading →

« Older posts

© 2025 Jordan Vuong — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑