“The CIA triad is a widely used information security model that can guide an organization’s efforts and policies aimed at keeping its data secure” (Fruhlinger). CIA stands for Confidentiality, Integrity, and Availability. Confidentiality meaning certain data and resources can only be authorized and accessed by certain individuals. Integrity means that the data and resources are…
Author: aspik002
What benefit can organizations gain from the NIST Cybersecurity Framework, and how would you use it at your future workplace?
What benefit is the NIST Cybersecuirty Framework, and how would you use it at your future workplace? The NIST Framework provides a policy of network protection security for organizations. The NIST is a layout on how a organization should asses current and future threats, risks, resources and help an organization to align and prioritize its cybersecurity activities. The…
How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge?
When you think of a business small or big that just started/opened you may think about the security they have in place, some may not even have anything in place yet. But security is a must have in any business for many purposes including threats and breaches. Technology is growing day by day and so…
How has cyber technology created opportunities for workplace deviance?
Workplace deviance is when someone purposely attempts to destroy/sabotage a company by creating problems within the workplace. According to Hrzone there are two sides to workplace deviance and those are, “Interpersonal deviance, which attempts to sabotage relationships through activities like gossiping, lying and apportioning blame, and organisational deviance, such as lateness or theft of equipment…
You are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)?
Information availability ensures that people can access information whenever they need it. Availability also guarantees reliable and constant access of information only to an authorized person. So if I were to be the chief information security officer of a publicly traded company, the main protection I would implement to ensure availability for my company’s systems would…