Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.
Author: hcara002
Journal 10.2: Understanding Social Cybersecurity and National Defense
Read the following and write a journal entry summarizing your response to the article on social cybersecurity
Journal 10.1: Cybersecurity Analysts and Social Themes
Watch this video. As you watch the video https://www.youtube.com/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a journal entry describing social themes that arise in the presentation.
Journal 8: Misconceptions of Cybersecurity by Media
After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. Has this understanding changed over time? What is different in the older pieces of media vs more current media?
Journal 6: Misconceptions Surrounding Cybersecurity
We have many misconceptions about cybersecurity. Here, hackers tell you about some of our misconceptions. What personal misconceptions did you have before you started to study cybersecurity? Have those been proven right or wrong?
Write-Up: The Human Factor
As the Chief Information Security Officer (CISO), realizing that you have a limited budget (the amount is unimportant), how would you balance the tradeoff of training and additional cybersecurity technology? That is, how would you allocate your limited funds? Explain your reasoning.
Write-Up: Attacks on Availability
What is an “attack on availability”? Describe a recent example of such an attack. Discuss the broader implications of these attacks on organizations and users.
Journal 5: Motives for Cyber Offending
Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
Cybercrime Theories
Identify which theories you think best explain cybercrime and discuss what you like about that theory.
The “Short Arm” of Predictive Knowledge
How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge?