{"id":163,"date":"2025-12-05T23:52:41","date_gmt":"2025-12-05T23:52:41","guid":{"rendered":"https:\/\/student.wp.odu.edu\/nfull005\/?page_id=163"},"modified":"2025-12-06T00:59:59","modified_gmt":"2025-12-06T00:59:59","slug":"journal-entry-13","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/nfull005\/journal-entry-13\/","title":{"rendered":"Journal Entry 13"},"content":{"rendered":"\n<p class=\"has-black-color has-text-color has-link-color wp-elements-7428d429db553a7ee952ab9e88fe424c\"><strong><em>Prompt<\/em><\/strong><em>: Read this article <a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true<\/a> and write a summary reaction to the use of the policies in your journal.\u00a0Focus primarily on the literature review and the discussion of the findings.<\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>The principles I saw being used or mentioned were Liability, Information Flow, and Standard and Certifications. When I was reading, I was surprised to see that the government was influenced by cybersecurity and decided that that there would be more benefit over cost when it comes to having secure systems by creating a VDP for all agencies. It was also shown in the study through the mention of how Verizon found that 60% of small businesses failed because of a major security breach, which ends up falling on the shoulders of the business owners for their cybersecurity. For information flow, I would say it pertains to how much information is known about ethical hackers and their cost\/benefit. If these companies or individuals had more knowledge about ethical hackers and how there was an equal value between smaller and bigger companies, I wonder if they would have been able to utilize those resources in order to better protect themselves.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Prompt: Read this article https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true and write a summary reaction to the use of the policies in your journal.\u00a0Focus primarily on the literature review and the discussion of the findings. The principles I saw being used or mentioned were Liability,&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/nfull005\/journal-entry-13\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31434,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/pages\/163"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/users\/31434"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/comments?post=163"}],"version-history":[{"count":2,"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/pages\/163\/revisions"}],"predecessor-version":[{"id":231,"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/pages\/163\/revisions\/231"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/nfull005\/wp-json\/wp\/v2\/media?parent=163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}