The Human Factor in Cybersecurity

There are a vast number of debates with human factors within the cybersecurity realm. For many reasons stated by Capone (2018), “while people are certainly an important aspect of data security and serve as critical administrators, humans cannot serve as the be-all-end-all.” Human intelligence goes beyond what is believed to be honest and forthright, though…

Legal System Response to Technological Advancements

Cybercrime has been the leading deviant act in the world. With the growing advances worldwide, criminal acts can be done with just one click and a couple of swipes. There has been an abundance of money lost, thief, and emotional distress due to the engagement of cybercrime as many of today’s entities are carried out…

SCADA Systems

The SCADA system, also known as Supervisory control and data acquisition is the system that analyzes and collects data with the help of sensors. As the SCADA system article mentions, this system is used for a variety of things which include systems of water distribution, traffic lights, electricity transmission, gas transportation and oil pipelines, and…

The CIA Triad

The CIA Triad is a security model that keeps data secure while aligning organizations’ policies and procedures which keep data secure. The acronyms themselves shape the purpose of the triad. That would include confidentiality, which includes those who are authorized to have the ability to modify data. The next component is integrity which aids against…