Applying Scientific Principles to Strengthen Cybersecurity Strategies Picryl The seven scientific principles of relativism, objectivity, parsimony, empiricism, skepticism, ethical neutrality, and determinism align with cybersecurity. Relativism provides the understanding that all things in the cybersecurity field are related; changes in one system change things in others. Any change in societal, educational, political, technological, criminal justice,…
Week 1: Journal Entry 1
Exploring Cybersecurity Career Paths: Aligning Interests with the NICE Framework WIKIMEDIA COMMONS After reviewing the NICE Workforce Framework, I’ve identified areas that interest me and others that are less appealing. Given my limited knowledge in cybersecurity, I am less interested in the Work Role Categories of Oversight and Governance (OG) and Design and Development (DD)….
Career Professional Paper
Bridging Cybersecurity and Social Science: Enhancing Digital Forensic Practices
Article Review #2
Beyond Technology: Exploring “Cyberbullying and Psychological Stress among Female Employees” Through a Social Science Lens
Article Review #1
A Social Science Examination of “The Need for a Cybersecurity Education Program for Internet Users with Limited English Proficiency: Results from a Pilot Study”
Week 15: Journal Entry 15
From Accounting to Digital Forensics: David Teo’s Journey Bridging Financial Expertise with Cyber Investigations NARA & DVIDS PUBLIC DOMAIN ARCHIVE Understanding Human Behavior in Financial and Cyber Crimes Accountants like David Teo, especially those specializing in forensic accounting, possess a unique skill set that aligns closely with the competencies required in digital forensic investigations. Accountants…
Write-Up: The CIA Triad
Authentication and Authorization in the CIA Triad https://www.nist.gov/image/cia-triad BLUF The CIA Triad is a cybersecurity model with the initialism of Confidentiality, Integrity, and Availability. Authentication verifies a user, and authorization determines what an authenticated user can do. The CIA Triad The CIA Triad, developed in the 1970s, identifies confidentiality, integrity, and availability as the three…
Write-up: SCADA Systems
Securing SCADA: Mitigating Cybersecurity Risks in Critical Infrastructure Image created with assistance from OpenAI’s ChatGPT and DALL·E BLUF SCADA systems face vulnerabilities due to legacy protocols, increased connectivity, and human factors. SCADA applications can mitigate these risks by incorporating redundancy, enhanced security, and training. SCADA System Overview Supervisory Control and Data Acquisition (SCADA), also known…
Write-up: The Human Factor in Cybersecurity
Optimal Cybersecurity Budgeting: Investing in People and Technology Image created with assistance from OpenAI’s ChatGPT and DALL·E BLUF The optimal allocation of a limited cybersecurity budget distributes 40% to employee training and 60% to technology. Assessment The first step as a Chief Information Officer would be conducting a comprehensive assessment of the organization’s cybersecurity posture….