{"id":449,"date":"2023-11-03T03:47:43","date_gmt":"2023-11-03T03:47:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/rknap004\/?p=449"},"modified":"2023-11-03T03:47:43","modified_gmt":"2023-11-03T03:47:43","slug":"cyse-201s-journal-entry-12","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/rknap004\/2023\/11\/03\/cyse-201s-journal-entry-12\/","title":{"rendered":"CYSE 201S- Journal Entry #12"},"content":{"rendered":"\n<p><strong>Q: Read <a href=\"https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf\">this<\/a> <a href=\"https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf\">https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf<\/a>\u00a0 sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter.\u00a0\u00a0<\/strong><\/p>\n\n\n\n<p>The following notification document, submitted by the company \u201cGlass Washer Parts\u201d, goes into depth about a security breach within their system where a group of attackers had placed malware onto the platform\u2019s servers and further utilized it to steal private information from dozens of their customers. From this example, it\u2019s pretty clear that there are several theories both from cybersecurity-economics and cybersecurity-social science theories that can explain the motivation behind this attack. In terms of economics, the rational choice theory explains that the attacker group exploited people out of their information simply out of their own self interest, since they\u2019d make money off of their payment card information and since this reward outweighed the potential repercussions. One social science theory that leans into this idea is the neutralization theory proposed by Sykes and Matza, in which every individual already knows what\u2019s morally right or wrong, but commits the crime due to the risk and reward factors attributed to the action, which we can clearly see with this situation. Another theory that could be used to explain this situation is the Marxian economic theory, which states that \u201cthose with power exploit those without power\u201d; in this instance, the attackers had the power to exploit the weak cybersecurity with the company and the customers that trusted their data with that company, to which the company was none the wiser about the incident for months. Moreover, the conflict theory states that offenders commit due to differences in power, and because the attackers had the ability to exploit customers out of their information, they took advantage of that power.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Q: Read this https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf\u00a0 sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter.\u00a0\u00a0 The following notification document, submitted by the company \u201cGlass Washer Parts\u201d, goes into depth about a security breach within their system where a group of attackers had&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/rknap004\/2023\/11\/03\/cyse-201s-journal-entry-12\/\">Read More<\/a><\/div>\n","protected":false},"author":24879,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/posts\/449"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/users\/24879"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/comments?post=449"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/posts\/449\/revisions"}],"predecessor-version":[{"id":450,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/posts\/449\/revisions\/450"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/media?parent=449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/categories?post=449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/tags?post=449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}