Journal #13

The article is focused on bug bounty programs. Bug bounty programs pay people for identifying vulnerabilities in a company’s network or physical security network. The article found for the first time the elasticity of hacker supply, which was between 0.1 and 0.2. This means that hackers who are willing to do the program are mostly…

Journal #12

The two economic theories that relate to this security breach letter are the rational choice and Laissez-faire economic theory. Rational choice is the business’s ability to make choices in its best interest. This relates to the article by showing how the company hired the “leading cybersecurity firm” to remove the malware from its systems so…

Journal #7

Developing a cybersecurity program comes with many challenges presenting some costs and benefits to add to the company implementing the program First, some costs of developing a cyber security program are financial expenses, resource allocation, and complexity. Financials are a huge part of business, money keeps a business running and operational. When looking into a…

Journal #6

Workplace deviance refers to intentional behaviors by employees that violate organizational norms, policies, or ethical standards, and that can potentially harm the organization, its employees, or its stakeholders. Cyber technology has created many paths for workplace deviance from small actions that just affect the company at a local or individual level, to huge problems that…

Journal #10

I believe that the article “Social Cybersecurity An Emerging  National Security Requirement” is a very informative article about the relatively new concept of social cybersecurity. The article states that cybersecurity is like using a computer to hack into other computers and social cybersecurity is using computers to hack into humans. This is fascinating because you…

Journal #11

Cybersecurity is an extremely social field. The video brought up that networking is a huge part of looking for and securing a cybersecurity job. Networking is so important in getting a cyber job because of the amount of people applying. If you already have an in then it will be easier for the company to…

Journal #9

On the Social Media Disorder Scale, I scored a 3 out of 9 which does not qualify me for having a social media disorder. The items in the list were relevant and reasonable to ask to see if someone has a problem with social media. The only thing I would change about the scale would…

Journal #8

After watching the video, I believe there is a lot of media can and has done to misconstrue the public’s view on cybersecurity. First, most media portray hacking and cybersecurity as a quick and easy task if you know what to type, when completing these process actually takes hours or even weeks. Both securing a…