Author: mbrad039

Bug Bounty Policies

Article: Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties by Kiran Sridhar and Ming NgThis articles focuses on the speakers research into how bug bounties effect businesses. Though the finance, retail, and healthcare sectors had a minor deviance of 5% from other industries, all industries performed similar. The speakers in the research article established… Read more →

Sample Data Breach Notification Review

After reviewing the sample data breach notification, the two primary aspects of both economics theory and the social sciences that I see emphasized by it are:Economics:1: Keynesian Theory– Reflecting the need for governmental rules and regulations forcing stricter adherence to cyber security practices.2: Laissez-Fare Theory– As a means of checks and balances against governmental over reach.Social Science:1: Economics- What impact… Read more →

Workplace Deviance Discussion Board

Workplace Deviance has expanded, in some ways, with the introduction of cyber technology. Businesses, schools and governments have always had a vested interest in how their employees spend their working time and as such have developed a menagerie of policies meant to keep deviance within acceptable norms. However, with the introduction of cyber technology there has become an influx of… Read more →

The “Short Arm” of Predictive Knowledge Discussion Board

In the Reading: The speaker makes a concerted effort to identify the difference between the technological age and history. Given by the great scope of time, cyber technology is barely a blip on the radar. Historically questions of ethics and morality were always close to home. As the speaker explains, the farmer is not removed from the field, he is… Read more →

Reflecting on Social Cyber Security

Misinformation has always been a concern on the world stage. With the advent of the cyber realm, this concern has been propelled to the fore front of many national security professionals minds. Their are active information conflicts happening around the globe. Its cheaper than conventional warfare. Requires very few personnel to pull off and can reach anywhere in the world… Read more →

Studying Data Breaches

PrivacyRights.org maintains a list of publicly available information about the various forms of data breaches. Their chronologic data base is divided by the type of breach. Studying the natural evolution of cyber attacks could yield valuable information into the changes in the trend analysis of currant in-use risk mitigation techniques. As these attacks continue to evolve, so too must the… Read more →