{"id":452,"date":"2024-11-10T17:46:25","date_gmt":"2024-11-10T22:46:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aaroncominio\/?p=452"},"modified":"2024-12-02T11:18:50","modified_gmt":"2024-12-02T16:18:50","slug":"week-11-journal-entry-12","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/11\/10\/week-11-journal-entry-12\/","title":{"rendered":"Week 11: Journal Entry 12"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Exploring Social Science Theories in Cybersecurity: The Glasswasherparts.com Data Breach<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/29723649810_7bc6eb78a7_k-1024x768.jpg\" alt=\"\" class=\"wp-image-453\" style=\"width:841px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/29723649810_7bc6eb78a7_k-1024x768.jpg 1024w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/29723649810_7bc6eb78a7_k-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/29723649810_7bc6eb78a7_k-768x576.jpg 768w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/29723649810_7bc6eb78a7_k-1536x1152.jpg 1536w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/29723649810_7bc6eb78a7_k-400x300.jpg 400w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/29723649810_7bc6eb78a7_k.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-right has-cyan-bluish-gray-color has-text-color has-link-color wp-elements-552b4e80120ddf3424fcede8ed91717d\"><a href=\"https:\/\/www.flickr.com\/photos\/143601516@N03\/29723649810\" data-type=\"link\" data-id=\"https:\/\/www.flickr.com\/photos\/143601516@N03\/29723649810\">Blogtrepreneur<\/a><\/p>\n\n\n\n<p>The \u201cSample Data Breach Notification\u201d is a letter notifying patrons of glasswasherrparts.com that their third-party platform provider was compromised by malware. Data containing customer credit and debit card numbers, prior purchase history, names, addresses, and phone numbers have been stolen. This data breach directly relates to Rational Choice and Marxian economic theories, as well as the social science theories of determinism and empiricism.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Economic Theories<\/h3>\n\n\n\n<p>Rational Choice Theory states that individuals and businesses make choices in their best interest. Glasswasherpats.com chose to hire a third-party platform provider to host its website. This choice was most likely because it could not rationalize spending the money to create its own web hosting service. The choice was made to maximize profits, as web hosting is not part of their business model. This rational decision forced Glasswasherparts.com to trust the security of its website to a third-party company, which failed. It could also be inferred that the third-party web hosting company chose its profit margin over allocating more funding to cybersecurity. The rational choices differ in this respect, as Glasswasherparts.com must use a third-party web host. In contrast, that third-party platform host chose profit (pleasure) over ensuring a robust cybersecurity program, ultimately costing them pain.<\/p>\n\n\n\n<p>Marxian economic theory focuses on the power dynamics within society. Those with power exploit those without power. The victimized customers of Glasswasherparts.com have less power than the powerful corporations they trusted with their information. The patrons are at a disadvantage and suffer from more powerful companies that take advantage of their information. The same can be said about the small company Glasswasherparts.com. They were exploited by the larger third-party web host\u2019s inability to prevent cyber intrusion. The Marxian economic theory can also be applied to the third-party web host. In this example, the less powerful web host company was exploited by more powerful hackers. In all of these instances, those with power took advantage of those without power.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Social Science Theories<\/h3>\n\n\n\n<p>Determinism is a social science theory that suggests that preceding events influence behavior. The breach of the Glasswasherparts.com website resulted from the actions taken by the hacker&#8217;s ability to place malware on the provider&#8217;s server. This indicates that inadequate cybersecurity created vulnerabilities that led to the breach. A broader view of determinism can also be applied to this data breach notification. Considering what factors led to the data breach, like the economic conditions of all the parties involved and technological trends, all influence the outcome.<\/p>\n\n\n\n<p>The data breach notification also reflects the social science theory of Empiricism, which emphasizes the importance of empirical research. The notification mentions that the platform provider hired a leading cybersecurity firm to help federal law enforcement investigate the data breach. This involves applying empirical research to assess and manage the cyber incident.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>The \u201cSample Data Breach Notification\u201d illustrates how Rational Choice and Marxian economic theories, along with the social science theories of determinism and empiricism, relate to cybersecurity incidents. These theories help understand the data breach by emphasizing the complex interactions between human behavior and technology.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Exploring Social Science Theories in Cybersecurity: The Glasswasherparts.com Data Breach Blogtrepreneur The \u201cSample Data Breach Notification\u201d is a letter notifying patrons of glasswasherrparts.com that their third-party platform provider was compromised by malware. Data containing customer credit and debit card numbers, prior purchase history, names, addresses, and phone numbers have been stolen. This data breach directly&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/11\/10\/week-11-journal-entry-12\/\">Read More<\/a><\/div>\n","protected":false},"author":29612,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/posts\/452"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/users\/29612"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/comments?post=452"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/posts\/452\/revisions"}],"predecessor-version":[{"id":457,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/posts\/452\/revisions\/457"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/media?parent=452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/categories?post=452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/tags?post=452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}