Journal Entry – Week #14
When looking at the list, some actions stand out as much more serious because of how they can harm people or break major laws. The five most serious violations to me are faking...
When looking at the list, some actions stand out as much more serious because of how they can harm people or break major laws. The five most serious violations to me are faking...
The article on bug bounty program really shows how companies are using economic thinking to improve cybersecurity. Basically, bug bounties pay ethical hackers to find...
The article on bug bounty program really shows how companies are using economic thinking to improve cybersecurity. Basically, bug bounties pay ethical hackers to find...
The GlasswasherParts data breach letter shows how both economic and psychological ideas show up in real world situations. From an economic perspective, rational choice theory...
The cybersecurity analyst role involves both technical responsibilities and an understanding of social behavior within digital environments. Typically, this is a 24-hour position...
After taking the Social Media Disorder scale, I scored in the risky usage range, which honestly didn’t shock me. I wouldn’t say that I’m addicted, but...