The Change Healthcare Ransomware Attack

Introduction In February 2024, Change Healthcare, a subsidiary of UnitedHealth Group, experienced a ransomware attack that shook the U.S. healthcare industry to its core. As one of the nation’s leading providers of healthcare technology solutions, Change Healthcare plays a pivotal role in processing millions of insurance claims daily and enabling the secure exchange of critical…

CYSE 201S Journal Entry #14

Andriy Slynchuk has described eleven things internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. The five violations I find most serious are: Sharing passwords, addresses, or photos of others is a serious breach…

CYSE 201S Journal Entry #12

Write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings. The literature review and discussion provide valuable insights into bug bounty programs, shedding light on their effectiveness and the motivations of security researchers. The empirical evidence presented supports the idea…

CYSE 201S Journal Entry #13

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. Economic Theories 1. Rational Choice Economic Theory The rational choice economic theory suggests that individuals make decisions that maximize their utility. In the context of the data breach,…

CYSE 201S Journal Entry #11

Watch this video. As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0, think about howthe description of the cybersecurity analyst job relates to socialbehaviors. Write a paragraph describing social themes that arise in thepresentation. The description of the cybersecurity analyst job in the video highlights several social themes that are integral to the role. Firstly, the emphasis on the…

CYSE 201S Journal Entry #10

Read this and write a journal entry summarizing your response to thearticle on social cybersecurity https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ The article on social cybersecurity portrays a complex landscape of modern warfare, depicting a shift from traditional conflict to a battlefield dominated by information manipulation. The strategic implications are profound, highlighting the evolution of warfare into a realm where…

CYSE 201S Journal Entry #9

Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? During the past year, have you … Out of nine, I scored an underwhelming two. The only two that I could relate with…

CYSE 201S Journal Entry #8

How the media influences our understanding of cybersecurity Dramatization of Hacking Films and TV shows often depict hacking in a thrilling and visually engaging manner. While this can be entertaining, it can also create unrealistic expectations and misrepresent the actual processes involved in cyberattacks. Cybersecurity Experts and Heroes Many movies and TV series feature cybersecurity…

CYSE 201S Journal Post #7

“Alright everyone, it’s time for your yearly cybersecurity training exercises” How does this meme relate to Human Systems Integration? Scheduled cybersecurity training and HSI are closely related, as both aim to optimize the interaction between human and complex systems. Training enhances the skills and knowledge of cybersecurity, or any other type of professional, as it…

CYSE 201S Journal Entry #5

Review the articles linked with each individual motive. Rank themotives from 1 to 7 as the motives that you think make the most sense(being 1) to the least sense (being 7). Explain why you rank eachmotive the way you rank it. The motive that makes the most sense to me, would have to be money….

CYSE 201S Journal Entry #4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Technology helps me with my physiological needs as I sometimes order food from my phone. For safety needs, I have a Ring doorbell camera, allowing…

CYSE 201S Journal Entry #3

Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information tostudy breaches? Enter a paragraph in your journal. Researchers can analyze the data provided on PrivacyRights.org to gain insight into the frequency, scale, and characteristics of data breaches. This can help researchers identify patterns and trends. The…

CYSE 201S Journal Entry #1

Reviewing the NICE Workforce Framework The NICE Workforce Framework for Cybersecurity is a lexicon that categorizes cybersecurity jobs and what those jobs would require workers to know and be able to do. It lists the task statement, knowledge statement, skill statement, work roles, and competency areas for the job. The NICE Framework shows the cybersecurity…

CYSE 201S Journal Entry #2

Explain how the principles of science relate to cybersecurity It was argued by Robert Bierstedt in 1970 that social sciences follow the same principles as natural sciences. In other words, social science is just as scientific as natural science. Overall, the principles can be applied to cybersecurity through social science. Some of the principles to…