Journal Entry Mod 4

With Maslow’s Hierarchy of Needs, each level has a specific need. Starting with the bottom need which is a physiological one would be the usage of my phone, although it sounds negative I cannot go without my phone in a sense I feel like I would just be bored out of my mind. For the…

Journal Entry 3

Visiting PrivacyRights.Org shows that most breaches happened within healthcare and it was most likely to happen with hacking. Researchers may use the information given to analyze the data that was taken and the causes of the breaches that occurred. They can also compare the data that was taken to see if there is some sort…

How does the principle of science relate to cybersecurity?

To start, the principles of science are said to be applied to cybersecurity through a social science framework. The majority of the principles of science have a relation that deals with some type of research or the way research is conducted. The principles of science can guide cybersecurity research and it can also be a…

 Ethical Considerations of CRISPR Gene Editing

ALEXANDRA ORELLANA In this reading it speaks about editing genes in a human embryos, there is a positive where it could cancel out the bad genes example to avoid deafness but have a negative outcome by having unwanted changes. Even though its not ready for clinical application, there are discussions for the long term affects…

Scada Systems

Scada SystemsBLUFScada systems- supervisory control and data acquisition, Scada is a database in which collectsdata. Scada System and its worksSCADA systems is the combination of hardware and software that authorize the industrialprocess by getting OT (operational technology) real time data. SCADA system is used to collectforms of data from industrial equipment. Scada refers to ICS(industrial…

The Human Factor

Human Factor In Cyber SecurityBLUFThere are many ways an individual can cause a cyber threat.Involvement of society in cyber threats The involvement of people in cyber threats aren’t on a small scale as there are heinousgroups or acts that impact others through technology. Members that are involved in the FarRights use mostly mobile devices to…