Alexandros Mendrinos2/11/2024Article Review #1AI’s influence on Digitail Crime InvestigationsThis article focuses on the Impact that artificial intelligence has on digital crime investigations.The main points of this article and study are to Understand the different methods of artificial intelligencethat is used by law enforcement, To explore the legal implication of using AI in the analysis of…
Cyber Budget
Cyber BudgetAs a chief technological officer your duty for your budget is split up in two sections. TheFirst being cyber security training, such as going over safe email use and the second part iscyber security technology . An example of this would be a firewall or 2 factor authentication.Cyber Security TrainingIn a company cyber security…
SCADA Applications
Name: Alexandros MendrinosDate: 11/9/2023SCADA ApplicationsSCADA systems are Supervisor control data acquisition systems used in critical infrastructure.SCADA systems are used to control and monitor systems in these critical sites and use theirsystem to help deal with the complexity. SCADA uses typically automated systems to helpmanage these sites.Critical InfrastructureThere are many risks associated with critical infrastructure because…
C.I.A Triad
Defending Your DataThe CIA triad is a system composed of three key parts to help keep information safe.The three parts are confidentiality, integrity and availability. These three elements help keepdata and information safe. Authentication is making sure a person matches their info they giveyou and authorization is if you have permission to access certain information…