The CIA Triad and the Difference Between Authentication and Authorization BLUF:The CIA Triad is basically the backbone of cybersecurity. It stands for Confidentiality, Integrity, andAvailability. These three things help make sure information stays safe, accurate, and accessible.Authentication and authorization are also super important. They decide who can...
Read MoreJournal Entry – Week #14
When looking at the list, some actions stand out as much more serious because of how they can harm people or break major laws. The five most serious violations to me are faking your identity, sharing passwords or personal information of others, collecting information about children, bullying and trolling, and illegal searches on the internet. Faking your...
Read MoreJournal Entry – Week #13
The article on bug bounty program really shows how companies are using economic thinking to improve cybersecurity. Basically, bug bounties pay ethical hackers to find vulnerabilities in a company’s code, which helps companies catch bugs that they might have missed. The literature review pointed out that more eyes on a program mean more bugs get...
Read MoreJournal Entry – Week 13
The article on bug bounty program really shows how companies are using economic thinking to improve cybersecurity. Basically, bug bounties pay ethical hackers to find vulnerabilities in a company’s code, which helps companies catch bugs that they might have missed. The literature review pointed out that more eyes on a program mean more bugs get...
Read MoreJournal Entry #12
The GlasswasherParts data breach letter shows how both economic and psychological ideas show up in real world situations. From an economic perspective, rational choice theory fits because the company is taking deliberate steps to minimize losses and protect its customers. They weighed the risks and acted accordingly. Keynesian economic theory also applies...
Read More

