CYSE 201S Journal 12: Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious

I think that the five most serious online violations (in no particular order) are bullying, faking your identity online, illegal searches on the internet, sharing passwords/addresses/photos of others, and collecting information about children. To start, online bullying, or cyberbullying, is Continue reading CYSE 201S Journal 12: Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious

CYSE 201s Journal 11b: Read this article and write a summary reaction to the use of policies in your journal. Focus primarily on the literature review and the discussion of the findings.

This is a great article that dives into bug bounty programs, exploring their impact on cybersecurity and shedding light on factors that influence the number of valid vulnerability reports received by these programs. It begins by dissecting the literature concerning Continue reading CYSE 201s Journal 11b: Read this article and write a summary reaction to the use of policies in your journal. Focus primarily on the literature review and the discussion of the findings.

CYSE 201s Journal 11a: Read this sample breach letter and describe how two different economic theories and two different social science theories relate to the letter

The sample data breach letter is somewhat similar to the classic economic theory. Classic economic theory suggests that markets are generally efficient and self-regulating. The security breach, as explained in the letter, can be seen as a disruption to the Continue reading CYSE 201s Journal 11a: Read this sample breach letter and describe how two different economic theories and two different social science theories relate to the letter

CYSE 201S Journal 10b: Write a paragraph describing social themes that arise in the presentation

After watching the video, I thought of several social themes that are related to her video about cybersecurity analysts. First, she mentions at the beginning of the video, in the segment “What is a Cybersecurity Analyst”, that cybersecurity analysts (CA’s) Continue reading CYSE 201S Journal 10b: Write a paragraph describing social themes that arise in the presentation

CYSE 201S Journal 10a: Read this and write a journal entry summarizing your response to the article on social cybersecurity

The article “Social Cybersecurity: An Emerging National Security Requirement” is a great article that explores the field of social cybersecurity, emphasizing its critical role in contemporary warfare dominated by information and psychological tactics. It focuses on the decentralized nature of Continue reading CYSE 201S Journal 10a: Read this and write a journal entry summarizing your response to the article on social cybersecurity