Journal Entries

    • CYSE 201S Presentation

      Cybersecurity in Healthcare: Protecting Patient Data and Public Health

    • CYSE 201: Journal Entry 14: Top Five Internet Violations and Why They Matter

      After reading “11 Illegal Things You Unknowingly Do on the Internet” by Andriy Slynchuk, I reflected on which actions pose the greatest risks to individuals and society. Some violations are minor, but others can lead to serious harm or legal consequences. In my view, these five stand out as the most concerning because of their……

    • CYSE 201: Journal Entry 13: Bug Bounty Policies

      This article breaks down how bug bounty programs work and why they matter. From the literature review, it’s clear that these policies are built around cost-benefit thinking. Instead of hiring full-time security teams to find every vulnerability, companies open up their systems to ethical hackers who get paid when they find something useful. This approach……

    • CYSE 201: Journal Entry 12: Economic and Psychological Theory Connections to Data Breach Example

      Even though this is just a sample breach letter, it still shows how real cybersecurity situations connect to both economics and psychology. From the economics side, the rational choice theory fits the attackers. They didn’t just randomly hit a system. They chose a platform that gave them access to customer payment data over a long……

    • CYSE 201: Journal Entry 11: Video Review – What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook

      This video about the cybersecurity analyst job shows how much the role connects to social behavior. It’s not just about stopping attacks or fixing systems. Analysts have to work with people across different teams and explain threats in ways that make sense to everyone, not just tech experts. They also help train employees to spot……

    • CYSE 201: Journal Entry 10: Social Cybersecurity Article

      Reading this article helped me understand how social cybersecurity focuses more on people and behavior than just systems and data. It breaks down how attackers use manipulation, like misinformation, fake profiles, and phishing, to target individuals and communities online. I thought it was interesting how the article emphasized that humans are often the weakest link……