dhale002 wrote: Economics and Social Science
In some ways, economics helps cyber professionals understand cyber attacks from a monetary perspective. In economics, there are a couple of theories that explain how economies work. Also in some ways, social science helps cyber professionals underst (More) | |
dhale002 wrote: Social Cybersecurity
In the world today, there’s information warfare going on between numerous countries around the globe to promote propaganda, more division, and opposing views against countries that are peaceful. However, with the help of social cybersecurity, this (More) | |
nguma001 wrote: Career Paper
202310_CYSE201S_24153 CYBERSECURITY & SOCIAL SCIENCE
Cyber Security and Social Science
Nathan Guman
Carrer Paper
Introduction:
According to the US Commerce Department’s Bureau of Economic Analysis, the digital economy accounted (More) | |
nguma001 wrote: Journal Entry 15
Nathan Guman
CYSE 201S Cyber Security and Social Science
Journal Entry 15
Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think abou (More) | |
Introduction to Security Awareness and Training SpecialistsIn the ever-evolving landscape of cybersecurity, security awareness and training (SAT) specialists play a pivotal role in safeguarding individuals and organizations from cyberattacks. (More) | |
jdavi203 wrote: Illegal Internet Activities
This blog post is about illegal activities on the Internet. The author describes them as things that are “quite common, but may lead to unwanted consequences” (Slynchuk, 2021). The top 5 activities that it discusses includes using un (More) | |
nguma001 wrote: Journal Entry 14
Nathan Guman
CYSE 201S Cyber Security and Social Science
Journal Entry 14
Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious (More) | |
jdjan001 wrote: Journal Entry #14
Faking Your Identity Online
Online identity fraud is looked down upon due to its negative effects on trust, potential for fraud and scams, invasion of privacy, encouragement of cyberbullying, potential legal consequences, security problems, (More) | |
jdjan001 wrote: Journal Entry #13
This journal article uses data from HackerOne, a well-known site that links ethical hackers with companies looking to find and fix security flaws, to examine the world of bug bounties through the prism of economic modeling. The purpose of the s (More) | |
jdjan001 wrote: Journal Entry #12
How This Article Relates to Economic Theories:
Game of Theory:
Through the lens of game theory, the breach can be examined as a strategic interaction between a number of stakeholders, including the organization, clients, and possible attackers (More) | |
nguma001 wrote: Journal Entry 13
Nathan Guman
CYSE 201S Cyber Security and Social Science
Journal Entry 13
A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty pol (More) | |
nguma001 wrote: Week 12 Journal Entry
Nathan Guman
CYSE 201S Cyber Security and Social Science
Week 12 Journal Entry
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two differen (More) | |
This article, "Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties," by Kiran Sridhar and Ming Ng, discusses the use of bug bounty policies to improve cybersecurity. They present bug bounty policies as some (More) | |
This sample breach letter was obtained from the Montana Department of Justice. It was reported on April 5, 2017, as a result of a data breach incident that occurred with a business named GlassWasherParts.com. There are a couple of economic (More) | |
nguma001 wrote: Journal entry 11
Nathan Guman
CYSE 201S Cyber Security and Social Science
Journal Entry 11
Watch this video
https://www.youtube.com/watch?v=iYtmuHbhmS0Links to an external site.
, think about how the description of the cybersecurity analyst job relat (More) | |
jdjan001 wrote: Journal Entry #11
Because cybersecurity analysts must comprehend both the technological components of cybersecurity and the human variables that contribute to cyber risks, their work is closely associated with social behaviors. The job of cybersecurity analysts is to (More) | |
jdjan001 wrote: Journal Entry #10
Social cybersecurity is not merely a technical challenge but a fundamental societal issue that requires collective efforts from government agencies, private sector organizations, educational institutions, and civil society. By recognizing social cyb (More) | |
nguma001 wrote: Week 10 Journal Entry
Nathan Guman
CYSE 201S Cyber Security and Social Science
Week 10 Journal Entry
Read this and write a journal entry summarizing your response to the article on social cybersecurity
https://www.armyupress.army.mil/Journals/Military-Review/ (More) | |
nguma001 wrote: Article Review 2
Nathan Guman
Professor Diwakar Yalpi
CYSE 201S 24153 Cybersecurity & Social Science
04 November 2023
Article Review: Development of a new ‘human cyber-resilience scale
https://academic.oup.com/cybersecurity/article/9/1/tyad007/7 (More) | |
jdavi203 wrote: A cybersecurity analyst job's relation to social behaviors
In this video, Nicole describes what a cybersecurity analyst is. Within this, she either mentions or refers to a few different social themes. One of these is awareness; as a cybersecurity analyst, one would “be providing guidance and t (More) |