ODU Logo

Eportfolio

Kojo Agyemang

Author kagye002

Write Up – The Human Factor in Cybersecurity

The Human Factor in Cybersecurity As a Chief Information Security Officer with a limited budget, I would first conduct a thorough risk assessment to determine the most critical vulnerabilities Moshe (2024). I would allocate funds to essential cybersecurity technologies that… Continue Reading →

Opportunities for Workplace Deviance

The accumulation of lower-level cyber wrongdoing can negatively impact an organization’s operational and financial success, even though employee deviance is not as destructive as cybercrime. Employee deviance in cyberspace refers to actions that go against business policies, procedures, or standards… Continue Reading →

DISSCUSION BOARD: Protecting Availability

As the chief information security officer I would Lay down redundancy, I would have frequent backups, and I would substitute systems for guaranteed system reach. I would occasionally Apply solid invasion detection/prevention systems and arrange periodic security checks. I would… Continue Reading →

Career professional paper

Career paper  Cybersecurity Analysts: The Role of Social Science in Cybersecurity The career of a cybersecurity analyst is critical in the digital age. These professionals are tasked with protecting information systems from cyber threats, analyzing security breaches, and ensuring that… Continue Reading →

Article 2 review

Article Review 2(Introduction) Cyber resilience relates to the principles of the social sciences. Cyber resilience is an interdisciplinary concept that intersects with various principles of social sciences(Dupont 2019). In sociology, the concept relates to studying social systems and their ability… Continue Reading →

Article 1 Review

Article review 1(Introduction) Artificial Intelligence relates to the principles of the social sciences through Behavioral analysis: Social sciences often study human behavior, motivation, and interaction. In cybersecurity, Al can be used to analyze user behavior to detect anomalies that may… Continue Reading →

Journal Entry 14

Internet users may engage in various activities that are considered illegal. These can range from downloading and distributing copyrighted material without permission to engaging in cyberbullying, identity theft, phishing scams, and participating in illegal online markets. The five most serious… Continue Reading →

Journal entry 13

Drawing upon a comprehensive data set of bug bounty programs, we removed many of the sources of endogeneity plaguing research in the crowdsourced cybersecurity field and identified many of the factors that influence the quantity of valid vulnerability reports bug… Continue Reading →

Journal Entry 12

Economic theories such as rational choice theory and information asymmetry could be relevant to a data breach notification letter. Rational Choice Theory posits that individuals decide by weighing the costs and benefits to maximize their advantage. Here, companies might respond… Continue Reading →

Journal Entry 11

The role of a cybersecurity analyst intersects significantly with social behaviors, as these professionals are tasked with safeguarding information systems from threats that often originate from human actions. Whether through malicious intent, such as hacking and phishing, or inadvertent risks,… Continue Reading →

« Older posts

© 2025 Eportfolio — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑