Journal entry — Bug Bounty PoliciesA later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try…
CYSE201S Journal Entry (12) Case Study Theory Comparison
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciencestheories relate to the letter. After reading the article above I find that the theories that relate best to the given event are the classical economic theory, rational choice economic theory, social exchange theory,…
CYSE201S Journal Entry (11) Cybersecurity Analyst and Social Behaviors
Journal EntryWatch this video. As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0, think about howthe description of the cybersecurity analyst job relates to socialbehaviors. Write a paragraph describing social themes that arise in thepresentation. Cybersecurity analysts’ jobs can vary in the job title as well as particular tasks depending on where the job is located. However, each degree…
CYSE201S Journal Entry (10) Social Cybersecurity Article Review
Read this and write a journal entry summarizing your response to the article on social cybersecurity. Article: https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ I found the above article to be very interesting and explained a valuable viewpoint. When discussing traditional cybersecurity, the focus is on the technology that is being used to hack other forms of technology. Whereas the main…
CYSE201S Journal Entry (9) Social Media and Cybersecurity
Complete the Social Media Disorder scale. How did you score? Whatdo you think about the items in the scale? Why do you think thatdifferent patterns are found across the world? Overlooking the items found in the Social Media Disorder scale I can proudly say that I have not related to any of the following within…
CYSE201S Journal Entry (8) Media Influence on Cybersecurity
• Watch this video and pay attention to the way that movies distorthackers. Hacker Rates 12 Hacking Scenes In Movies And TV | HowReal Is It? – YouTube• After watching the video, write a journal entry about how you thinkthe media influences our understanding of cybersecurity In modern-day media, I feel cybersecurity is adjacently talked…
CYSE201S Journal Entry (7) Cybersecurity Memes
Review the following ten photos through a cybersecurity human systems integration framework.Create a meme explaining what is going on in the individual’s or individuals’ mind(s). Explain how your memes relate to Human Systems Integration.
CYSE201S Journal Entry (6) Identifying Fake Websites
The internet is full of websites and within the internet, there are also fake websites that aim to cause harm to their victims. In order to stay away from fake websites it is important to be able to identify key factors that could indicate that a website isn’t genuine. Firstly is to make sure the…
CYSE201S Journal Entry (5) Ranking Crime Motives
Review the articles linked with each individual motive. Rank themotives from 1 to 7 as the motives that you think make the most sense(being 1) to the least sense (being 7). Explain why you rank eachmotive the way you rank it. Articles and corresponding motives: • Entertainmenthttps://9to5mac.com/2021/07/19/man-behind-linkedin-scraping/ • Political https://economictimes.indiatimes.com/magazines/panache/new-generation-of-angry-youthful-hackers-join-the-hacktivism-wave-adding-to-cyber-security-woes/articleshow/81707844.cms • Revenge https://newsfromwales.co.uk/news/revenge-porn-victims-in-wales-often-feel-let-down-by-the-law-as-cybercrime-slips-through-the-net/ • Boredom…