{"id":365,"date":"2023-07-18T14:28:45","date_gmt":"2023-07-18T14:28:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/?p=365"},"modified":"2023-07-18T14:28:45","modified_gmt":"2023-07-18T14:28:45","slug":"journal-entry-11","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/journal-entry-11\/","title":{"rendered":"Journal Entry 11"},"content":{"rendered":"\n<p>Read this https:\/\/dojmt.gov\/wp-<br>content\/uploads\/Glasswasherparts.com_.pdf sample breach letter<br>\u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two<br>different economics theories and two different social sciences<br>theories relate to the letter.<\/p>\n\n\n\n<p>The economic theory rational choice relates to the letter because their business should\u2019ve invested more into their cybersecurity. Another economic theory that relates to the letter is Marxian economic theory this is because customers of the company are the vulnerable as their information was taken while the company itself is ok. The litter related objectivity because it didn\u2019t have an opinion or picked a particular side. The also related to determinism because their security wasn\u2019t good, so the result was a breach a in their system.<\/p>\n\n\n\n<p>Read this article<br>https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/61684<br>53?login=true and write a summary reaction to the use of the policies<br>in your journal. Focus primarily on the literature review and the<br>discussion of the findings.<\/p>\n\n\n\n<p>The ethical hackers very beneficial to companies because they help companies find bus in their software. Another is that they give companies the opportunity to work with these hackers if they don\u2019t have the ability to do so themselves. These hackers are price insensitive so companies who don\u2019t have many resources can benefit from them. They also provide the same quality of work despite the size of the company and their economic ability. Finance, retail, and healthcare companies have less reports. They also find that new software, based on statistics don\u2019t have a significant impact on the amount of reports. As well as older software\u2019s receive less reports as they grow older. These ethical hackers provide so much for the cost that they probably ask for.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read this https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf sample breach letter\u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how twodifferent economics theories and two different social sciencestheories relate to the letter. The economic theory rational choice relates to the letter because their business should\u2019ve invested more into their cybersecurity. Another economic theory that relates to the letter is Marxian economic theory this&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/journal-entry-11\/\">Read More<\/a><\/div>\n","protected":false},"author":25260,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/365"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/users\/25260"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/comments?post=365"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/365\/revisions"}],"predecessor-version":[{"id":366,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/365\/revisions\/366"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/media?parent=365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/categories?post=365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/tags?post=365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}