Creating effective cybersecurity policies is challenging because we can’t always predict how emerging technologies will evolve or impact society. Hans Jonas referred to this as the “short arm”. It is important to adopt a cautious approach when designing policies, particularly those with long-term implications. Rather than being stuck on what could happen or the unknown,…
Write Up – The Human Factor in Cybersecuirty
Introduction BLUF Cyber threats regarding human activity have taken a rise in popularity. Working to effectively balance a budget that improves not only the technology to mitigate these risk but to train the right personnel to prevent these cyber threats is critical. It should be a top priority to invest in training as well as…
Write-Up : CIA Triad
Introduction: The CIA triad model is made to guide policies throughout an organization and keep its software protected. The CIA triad serves as the cornerstone for cybersecurity and is incharge of the protection of organizations data. It has three main principles that it is based on confidentiality, integrity, and availability. All these principles share the…