Social Sciences for a Digital Forensics Analyst  

A person in the role of a digital forensic analyst works to discover how a cybercrime was committed, what data was lost due to the cyber-attack, and to determine who the offender is. This can include investigating a company’s data breach where customer data was stolen. Analysts use cyber security techniques to retrieve data from devices. In this case, the analyst would work to recover any data that was stolen, destroyed,…

Developing Metrics to Assess the Effectiveness of Cybersecurity Awareness Program – Article Review

This article relates to the human-centered cyber security model because it evaluates the effectiveness of methods used to mitigate the human factor in cyber security awareness (CSA) programs. Measuring the results by reviewing surveys, trainings, and behaviors before and after the training. The paper acknowledges there isn’t a single common understanding of what factors to measure or how to measure them during the evaluation of the cyber security awareness program. Without a standardized method of measuring the effectiveness…

Balancing Cyber Technology and Cyber Training 

Introduction  Threat actors are always working full time to try to break into secure systems. Whether it’s taking advantage of weak security practices, holes within the system or human error, organizations must ensure that they find a good balance to prevent major losses. This balance is difficult to achieve as technology grows with each day….

Complex Critical Infrastructure and SCADA Risk 

Introduction  Critical Infrastructure systems are the backbone to modern society but are the most at risk for cyber-attacks. These systems are vulnerable due to their growing complexity and reliance on a connected network. The Supervisory Control and Data Acquisition system, SCADA, is used to control, monitor and analyze industrial devices and processes (1). These systems include…

Authentication & Authorization within the CIA Triad

Introduction The CIA Triad model is a measure used by organizations to effectively manage and safeguard sensitive information. The model is made up of three components; confidentiality, integrity, and availability. While each concept has its own importance, together, the three make up major cybersecurity standards and values. Authentication and Authorization exist within the framework of…