https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true This is a study on bug bounties, which reward gig economy security researchers for finding flaws in corporate code, and demonstrates how economical these initiatives are. The study discovered that there is no discernible effect on the number of… Continue Reading →
There are 3 economic theories mentioned in module 11 that work together and apply to this letter. These theories are Laissez-fare economic theory, rational choice, and Marxian economic theory. The rational choice theory states that businesses make choices that occur… Continue Reading →
In Module 3 PowerPoint there were 2 common experiment questions. • Do certain interventions increase security behaviors by computer users?• Do certain characteristics of individuals increase the likelihood of unsafe practiceswhen using technology?
This question appears many times throughout the topic of cybersecurity. As technology advances so do threats. I do believe there is also competition or race by company to release products before a competitor which can lead to vulnerabilities being overlooked…. Continue Reading →
A cybersecurity analyst needs to understand both technology and people. They use psychology to predict and stop cybercriminals who trick others into sharing information. This job requires working well with others and being a part of a team to keep… Continue Reading →
This video shocked me for many reasons. One reason is that a 12-year-old was able to manipulate a bear meant to connect family and turned malicious. Module 6 in classes briefly discussed trust with the web and this elaborates on… Continue Reading →
To defend the security and sustain American influence abroad, leaders have to understand the upcoming discipline of social cybersecurity and how it impacts their force, nation, and values. Changes in communication and information flows have enabled the social cyberthreat: technology has… Continue Reading →
On a scale of 0-9, I scored a 2. The reason for this score is that using a distraction to help focus on another topic is not always negative. If an escape is needed to calm down, it does not… Continue Reading →
In this class for Module 7, the class learned about the National Vulnerability Database which gives a score called CVSS which stands for Common Vulnerability Scoring System. This system lists the vulnerabilities found in databases in a score that reflects… Continue Reading →
The media really affects how we see cybersecurity by how it talks about cyberattacks and data breaches. They often make big, dramatic stories out of them, making it seem like these incidents are always super dangerous. But they don’t always… Continue Reading →
I believe based on the article the top two cyber security mistakes are “We have to achieve 100 percent security” and “When we invest in best-of-class technical tools, we are safe”. These two mindsets can be dangerous. This can lead… Continue Reading →
This was very interesting to watch. Seeing the number of breaches that have occurred since 2013 and the businesses used daily was shocking. I find the idea of battling quantum computers with quantum science intriguing. It reminds me of the… Continue Reading →
Human integration in cybersecurity to me means how human behavior has influenced or changed technology/cyber. This is essential in the creation of cyber mechanisms as it can reduce human-made mistakes and increase an institution’s performance. Meme 1 (Top left corner):… Continue Reading →
The first law mentioned, “If there is a vulnerability, It will be exploited.” is something I agree with. Hackers find any vulnerability they can to reach their end goal. Law 2, “everything is vulnerable in some way.” is correct. Even… Continue Reading →
The government strives to protect the people and that is their responsibility. Privacy is important, but the security involved is essential. Just as within the real world, there are laws to protect the people while maintaining freedom. The people should… Continue Reading →
© 2025 Jasmyn Wilhelm — Powered by WordPress
Theme by Anders Noren — Up ↑