{"id":324,"date":"2023-03-29T22:50:03","date_gmt":"2023-03-29T22:50:03","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nicholasmalley1\/?p=324"},"modified":"2023-03-29T22:50:03","modified_gmt":"2023-03-29T22:50:03","slug":"module-11-journal-entry","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nicholasmalley1\/2023\/03\/29\/module-11-journal-entry\/","title":{"rendered":"Module 11 Journal Entry"},"content":{"rendered":"\n<p>Read this sample breach letter and describe how two different economics theories and two different social sciences theories relate to the letter.<\/p>\n\n\n\n<p>This sample breach letter relates to two economic theories. The first theory is rational choice theory. It relates to rational choice theory because it assumes that criminals choose their crime based on cost-benefit analysis. The hackers were stealing customers payment information so they figured they would make a lot of money from committing this crime, so they felt as if it was worth it. The second economic theory is the laissez-faire theory. It relates to thelaissez-faire theory because this could be prevented by the government or companies implementing more rules in order to prevent this type of crime but they would rather respond to it.<\/p>\n\n\n\n<p>This sample breach letter relates to two social sciences theories. The first theory is conflict Theory. It relates to conflict theory because there needs to be something wrong to happen. The second social science theory is Structuralism Theory. It relates to Structuralism Theory because the customers that were effected by this breach will have second thoughts before putting their card information into another system. <\/p>\n\n\n\n<p>Part 2-<\/p>\n\n\n\n<p>Write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.<\/p>\n\n\n\n<p>The job of a bug bounty is extremely important because it test the vulnerability and security of your companies network. It is important that all companies do this to ensure top notch security. The article shares that companies in the finance, retail, and healthcare sectors are not informed of their vulnerabilities in the networks. Making it a issue for security as they are not aware of the bugs in their system. When the must protect sensitive data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read this sample breach letter and describe how two different economics theories and two different social sciences theories relate to the letter. This sample breach letter relates to two economic theories. The first theory is rational choice theory. It relates to rational choice theory because it assumes that criminals choose their crime based on cost-benefit&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nicholasmalley1\/2023\/03\/29\/module-11-journal-entry\/\">Read More<\/a><\/div>\n","protected":false},"author":24907,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nicholasmalley1\/wp-json\/wp\/v2\/posts\/324"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nicholasmalley1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nicholasmalley1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholasmalley1\/wp-json\/wp\/v2\/users\/24907"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholasmalley1\/wp-json\/wp\/v2\/comments?post=324"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nicholasmalley1\/wp-json\/wp\/v2\/posts\/324\/revisions"}],"predecessor-version":[{"id":325,"href":"https:\/\/sites.wp.odu.edu\/nicholasmalley1\/wp-json\/wp\/v2\/posts\/324\/revisions\/325"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nicholasmalley1\/wp-json\/wp\/v2\/media?parent=324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholasmalley1\/wp-json\/wp\/v2\/categories?post=324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholasmalley1\/wp-json\/wp\/v2\/tags?post=324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}