Workplace deviance

Deviant behavior in cyber technology has definitley happened many times, and is a common thing as technology progresses. Work place deviance is when an employee has malicious intent to harm a business or an orginization, an employee can also cause deviance without the of being harmful and malicious as well. There are many different ways…

CISO protections

As the CISO of a company some of the protections I would implement are the several types of automated tools to monitor a system. One of the most important tools I would use is the malicious code scanner to be aware of any present and unwanted codes or viruses. I would also conduct penetration testing…

Nist cybersecurity framework

Organizations can benefit from the NIST cybersecurity framework because it provides policy framework of cybersecurity and guidance on how to protect organizations private information. The NIST framework helps prevent cyber attacks, detects and responds to cyber attacks as well. The framework provides a common systematic language which helps manage cybersecurity risk. I can see myself…

Vulnerabilities associated with infrastucture and SCADA system

There are many vulnerabilities that can come with an infrastructure system. From what I researched the type of vulnerabilities can be categorized into three categories. There are natural threats, human caused threats and technical or accidental threats. Natural vulnerabilities have to do with the weather and the surrounding environment. Natural threats can be hurricanes, earthquakes,…