{"id":378,"date":"2024-08-04T20:44:08","date_gmt":"2024-08-04T20:44:08","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/?p=378"},"modified":"2024-08-05T00:39:02","modified_gmt":"2024-08-05T00:39:02","slug":"module-11-journal-entries-1-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/2024\/08\/04\/module-11-journal-entries-1-2\/","title":{"rendered":"Module 11 Journal Entries 1 &amp; 2 &#8211; CYSE 201S"},"content":{"rendered":"\n<p>Journal Entry # 1 : <\/p>\n\n\n\n<p>Keynesian economists believe that government intervention is needed in times to<br>stabilize the economy. When a customer\u2019s data is lost it can erode the trust between the customer<br>and the company. Keynesian principles would implore the government to take action when a<br>data breach occurs. Cybersecurity laws and regulations can enforce businesses to invest in<br>security measures fostering a better relationship between patrons and economic stability. In<br>contrast using a lasses-fair economic approach what advocate for minimal government<br>intervention when a security breach happens. The sample breach demonstrates potential market<br>failures associated with cyber threats. Under this approach companies may under invest in cyber<br>security measures due to a lack of regulation making companies more vulnerable attacks and<br>putting more citizens information at risk. Keeping these aspects in mind, it emphasizes the<br>importance of government intervention for businesses to prioritize data security.<br>The first social science theory that I want to highlight is the social contract theory. This<br>theory asserts that individuals give up some freedoms for the benefits of society meaning for a<br>business to focus on protecting customer information and not solely on profits. In the context of<br>the sample breach the company failed in this aspect. Customers who trusted the glass company<br>with their information will feel as if they&#8217;re privacy was violated. When a breakdown of trust<br>occurs between a business and their customers, the only way to resolve this issue would be to<br>increase security measures. Using social learning theory to analyze the breach letter would mean<br>learning from it. If businesses were to observe the consequences that come from data breaches,<br>they would hopefully be more inclined to invest in cybersecurity measures. Additionally,<br>government consequences can be used to motivate companies to invest in cyber infrastructure.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Journal Entry # 2: <\/p>\n\n\n\n<p>Companies currently face a struggle having to identify and patch vulnerabilities in their<br>systems due to constant evolving cyber threats. Bug bounty programs use the expertise of ethical<br>hackers to uncover cybersecurity weaknesses in companies. Data from HackerOne showed that<br>these programs were in fact effective for numerous reasons. Most companies spend a good<br>portion of their time must to choose between internal security teams and external bug bounty<br>programs. Internal teams offer a sense of control, but their size sometimes isn\u2019t enough to handle<br>the amount of threats. Bug Bounty programs offer a global connection ethical hackers, increasing<br>the likelihood of a vulnerability being uncovered. Using this approach allows for the company to<br>align with market efficiency, gaining access to a wider talent pool at a potentially lower cost<br>compared to expanding internal teams.<br>After analyzing the data from HackerOne, it was found that ethical hackers were not<br>motivated by cash incentives, but rather by the intellectual challenge, reputation building, and the<br>opportunity to protect critical cyber infrastructure. Companies in industries such as finance,<br>retail, and healthcare receive fewer bug reports on average compared to those in sectors such as<br>tech or military. This can possibly be due to a perception of these industries being more secure<br>than others, a lack of awareness of Bug Bounty programs in these sectors, or potentially stricter<br>program guidelines that deter participation. To further understand the reason behind fewer<br>reports would need to be further studied. Overall, the study provides a valuable contribution to<br>the research on bug bounties. The study explains the potential bug bounties has a cost-effective<br>way to bolster cybersecurity protections, which can be useful for companies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal Entry # 1 : Keynesian economists believe that government intervention is needed in times tostabilize the economy. When a customer\u2019s data is lost it can erode the trust between the customerand the company. Keynesian principles would implore the government to take action when adata breach occurs. Cybersecurity laws and regulations can enforce businesses to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/2024\/08\/04\/module-11-journal-entries-1-2\/\">Read More<\/a><\/div>\n","protected":false},"author":28264,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/posts\/378"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/users\/28264"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/comments?post=378"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/posts\/378\/revisions"}],"predecessor-version":[{"id":395,"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/posts\/378\/revisions\/395"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/media?parent=378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/categories?post=378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/h0ll0w4y\/wp-json\/wp\/v2\/tags?post=378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}