A person in the role of a digital forensic analyst works to discover how a cybercrime was committed, what data was lost due to the cyber-attack, and to determine who the offender is. This can include investigating a company’s data breach where customer data was stolen. Analysts use cyber security techniques to retrieve data from devices. In this case, the analyst would work to recover any data that was stolen, destroyed,…
Developing Metrics to Assess the Effectiveness of Cybersecurity Awareness Program – Article Review
This article relates to the human-centered cyber security model because it evaluates the effectiveness of methods used to mitigate the human factor in cyber security awareness (CSA) programs. Measuring the results by reviewing surveys, trainings, and behaviors before and after the training. The paper acknowledges there isn’t a single common understanding of what factors to measure or how to measure them during the evaluation of the cyber security awareness program. Without a standardized method of measuring the effectiveness…
Cyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges – Article Review
This article discusses the correlation between social media and cyberbullying, attempting to answer several questions: “(1) How is cyberbullying defined in the literature? (2) What factors contribute to cyberbullying, and how can they be measured? (3) What is the impact of personality traits on the likelihood of engaging in or being victimized by cyberbullying? (4)…
Balancing Cyber Technology and Cyber Training
Introduction Threat actors are always working full time to try to break into secure systems. Whether it’s taking advantage of weak security practices, holes within the system or human error, organizations must ensure that they find a good balance to prevent major losses. This balance is difficult to achieve as technology grows with each day….
Complex Critical Infrastructure and SCADA Risk
Introduction Critical Infrastructure systems are the backbone to modern society but are the most at risk for cyber-attacks. These systems are vulnerable due to their growing complexity and reliance on a connected network. The Supervisory Control and Data Acquisition system, SCADA, is used to control, monitor and analyze industrial devices and processes (1). These systems include…
Authentication & Authorization within the CIA Triad
Introduction The CIA Triad model is a measure used by organizations to effectively manage and safeguard sensitive information. The model is made up of three components; confidentiality, integrity, and availability. While each concept has its own importance, together, the three make up major cybersecurity standards and values. Authentication and Authorization exist within the framework of…