A study was conducted on bug bounties, which are programs where security researchers are paid for finding and explaining vulnerabilities in company code bases. Bug bounty programs are a cost-effective way for companies to improve their security, according to advocates. The research supports the assertion using a large dataset and instrumental variables to eliminate potential…
Journal #7
I just Landed my dream job. I am so excited.
Journal #14
I believe that his career path was an interesting one because, in the early 2000s, a lot of people were starting to get into the field of information technology because people like Davin were interested in computers and wanted to try since his primary job was in an accounting firm, but he took an opportunity…
Journal #12
I believe the following are the top five transgressions. The first is that people these days go too far with trolling and bullying in person, which is a severe problem. Online is potentially worse because someone could hack your account and steal your information to annoy you. If you block them, they can always create…
Journal #9
I received a score of two out of nine on the social media disorder scale. In addition, one of the two scales is that I have attempted to reduce the amount of time I spend on social media, but I cannot do so because that is where I find videos that make me laugh. The…
Journal #10
One of the social behaviors that you need to have is to connect with others and be a team player. While everybody working in the modern industry should be comfortable interacting with others, the cyber domain presents a special challenge when it comes to forming effective teams. Another action that I believe is crucial is…
Journal #8
I feel that the media has influenced our understanding of cybersecurity by highlighting the cool parts of cybersecurity, such as hacking, but portraying them in an unrealistic manner in movies and on television. This is done in part because portraying things realistically would slow things down. Yet, this portrayal gives users, who see these films…
Journal #6
I found fake websites for Capital One, Wells Fargo, and Bank of America. From those sites, I found what makes them fake is that the domain name didn’t match the websites from the original second, there were ads all over the page, and they seemed too good to be true, like I could enter a…
Journal #4
Physiological needs- My experience with physiological needs is that I cannot go without my phone since I have everything and do everything with my phone. I would start to panic because I could not find it. For example, I was at a restaurant, and when we were about to leave, I wanted to check the…
Journal #2
The discipline of cybersecurity is an application of science. That is, professionals in the field frequently employ previously found knowledge and data to produce practical applications, the bulk of which take the form of technological breakthroughs. Social science (such as statistics), formal science (such as biology), and natural science (such as biology) are examples of…