Tags » CYSE 201S

In some ways, economics helps cyber professionals understand cyber attacks from a monetary perspective. In economics, there are a couple of theories that explain how economies work. Also in some ways, social science helps cyber professionals underst (More)
dhale002 wrote: Social Cybersecurity
In the world today, there’s information warfare going on between numerous countries around the globe to promote propaganda, more division, and opposing views against countries that are peaceful. However, with the help of social cybersecurity, this (More)
nguma001 wrote: Career Paper
202310_CYSE201S_24153 CYBERSECURITY & SOCIAL SCIENCE Cyber Security and Social Science Nathan Guman Carrer Paper Introduction: According to the US Commerce Department’s Bureau of Economic Analysis, the digital economy accounted (More)
nguma001 wrote: Journal Entry 15
Nathan Guman CYSE 201S Cyber Security and Social Science Journal Entry 15 Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think abou (More)
Introduction to Security Awareness and Training SpecialistsIn the ever-evolving landscape of cybersecurity, security awareness and training (SAT) specialists play a pivotal role in safeguarding individuals and organizations from cyberattacks.  (More)
This blog post is about illegal activities on the Internet.  The author describes them as things that are “quite common, but may lead to unwanted consequences” (Slynchuk, 2021).  The top 5 activities that it discusses includes using un (More)
nguma001 wrote: Journal Entry 14
Nathan Guman CYSE 201S Cyber Security and Social Science Journal Entry 14 Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious (More)
jdjan001 wrote: Journal Entry #14
Faking Your Identity Online Online identity fraud is looked down upon due to its negative effects on trust, potential for fraud and scams, invasion of privacy, encouragement of cyberbullying, potential legal consequences, security problems, (More)
jdjan001 wrote: Journal Entry #13
This journal article uses data from HackerOne, a well-known site that links ethical hackers with companies looking to find and fix security flaws, to examine the world of bug bounties through the prism of economic modeling. The purpose of the s (More)
jdjan001 wrote: Journal Entry #12
How This Article Relates to Economic Theories: Game of Theory: Through the lens of game theory, the breach can be examined as a strategic interaction between a number of stakeholders, including the organization, clients, and possible attackers (More)
nguma001 wrote: Journal Entry 13
Nathan Guman CYSE 201S Cyber Security and Social Science Journal Entry 13 A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty pol (More)
nguma001 wrote: Week 12 Journal Entry
Nathan Guman CYSE 201S Cyber Security and Social Science Week 12 Journal Entry Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two differen (More)
This article, "Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties," by Kiran Sridhar and Ming Ng, discusses the use of bug bounty policies to improve cybersecurity.  They present bug bounty policies as some (More)
This sample breach letter was obtained from the Montana Department of Justice.  It was reported on April 5, 2017, as a result of a data breach incident that occurred with a business named GlassWasherParts.com. There are a couple of economic (More)
nguma001 wrote: Journal entry 11
Nathan Guman CYSE 201S Cyber Security and Social Science Journal Entry 11 Watch this video https://www.youtube.com/watch?v=iYtmuHbhmS0Links to an external site. , think about how the description of the cybersecurity analyst job relat (More)
jdjan001 wrote: Journal Entry #11
Because cybersecurity analysts must comprehend both the technological components of cybersecurity and the human variables that contribute to cyber risks, their work is closely associated with social behaviors. The job of cybersecurity analysts is to (More)
jdjan001 wrote: Journal Entry #10
Social cybersecurity is not merely a technical challenge but a fundamental societal issue that requires collective efforts from government agencies, private sector organizations, educational institutions, and civil society. By recognizing social cyb (More)
nguma001 wrote: Week 10 Journal Entry
Nathan Guman CYSE 201S Cyber Security and Social Science Week 10 Journal Entry Read this and write a journal entry summarizing your response to the article on social cybersecurity https://www.armyupress.army.mil/Journals/Military-Review/ (More)
nguma001 wrote: Article Review 2
Nathan Guman Professor Diwakar Yalpi CYSE 201S 24153 Cybersecurity & Social Science 04 November 2023 Article Review: Development of a new ‘human cyber-resilience scale https://academic.oup.com/cybersecurity/article/9/1/tyad007/7 (More)
In this video, Nicole describes what a cybersecurity analyst is.  Within this, she either mentions or refers to a few different social themes.  One of these is awareness; as a cybersecurity analyst, one would “be providing guidance and t (More)