CYSE201S Journal Twelve

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf  sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. The first economic theory I’m recognizing from this is Rational Choice. The sample recognizes there was a breach, and to the best of their ability, they’re breaking down…

CS462 Term Blog

Introduction Millions of cyber-attacks took place across the world in 2022, from the massive state sponsored cyber-attacks from Russia upon Ukraine and her international allies to more domestic attacks like the ransomware attacks that swept across our nation last year. A variety of cyber-attacks were launched against education sectors, government entities, finance firms, and of…

Career Professional Paper – Penetration Testers

Introduction The professional career I chose to examine was a Penetration Tester. A penetration tester is a type of white-hat hacker who performs authorized investigations, and probing attacks of a network or device, called “Pentests” The reasoning behind these Pentests is to assess both the technical factors, and human factors protecting a network to see…

Article Review #2

Breaking Down “Estimating Causes of Cyber Crime” Introduction The article I decided to review this time is “Estimating Causes of Cyber Crime: Evidence from Panel Data FGLS Estimator”.  It starts by stating that the primary factor of why people resort to criminalized hacking has moved away from bragging rights, and primarily for monetary gain. It…

CYSE201S Journal Eleven

Watch this video.  As you watch the video https://www.youtube.com/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation. One of the duties of a cybersecurity analyst she discusses is training employees and getting them ready for potential incidences. This…

CYSE201S Journal Entry Ten

Read this and write a journal entry summarizing your response to the article on social cybersecurity.Article The article highlights how technology, and communication tech has enriched our lives in the past decades, but has also opened up brand new vulnerabilities across the world. It discusses not only dangers from foreign actors trying to attack countries…

CYSE201S Journal Six

3 Fake Websites 3 examples of fake websites might be: A bit harder to see as a fake site, but it is. It doesn’t use the official ABC news logo in the top left, and many of the articles appear to revolve around influencers or social media. Clearly no substance for a real site, let…

Article Review #1

Introduction The journal I chose for my review was “Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment”. In essence, the article goes talks about social media, and how a social media modeled healthcare system could benefit the industry. While it has many potential positive effects, it has some…

CYSE 201S Journal Five

Review the articles linked with each individual motive. Rank themotives from 1 to 7 as the motives that you think make the most sense(being 1) to the least sense (being 7). Explain why you rank eachmotive the way you rank it. 7. Recognition – Most hackers wouldn’t risk a crime for recognition unless it was…

CYSE 201S Journal Four

Review Maslow’s Hierarchy of Needs and explain how each levelrelates to your experiences with technology. Give specific examples ofhow your digital experiences relate to each level of need. Psychological Needs: Technology allows us to mas produce many food items, and everyday products we need in everyday life. It also allows us to stay warm, or…