Opportunities for Workplace Deviance Discussion Post

How has cyber technology created opportunities for workplace deviance? The increase in cyber technology has created various opportunities for workplace deviance. Cyber technology can lead to big distractions for workers who spend time browsing social media or non-work-related websites during their working hours. Many companies give employees computers, which they use during working hours to…

The Human Factor in Cybersecurity

This report outlines how, as a Chief Information Security Officer operating on a limited budget, how I would balance the tradeoff of training and additional cybersecurity technology. It explains my strategy for allocating limited funds, with detailed reasoning, to ensure no cyber threats. Groundwork As a Chief Information Security Officer I would first start by…

Critical Infrastructure Vulnerabilities and SCADA Mitigation

This report explains the vulnerabilities associated with critical infrastructure systems and the importance of it, what SCADA is, and how SCADA can be used to mitigate these infrastructure vulnerabilities. The Importance of Infrastructure and Its Vulnerabilities  Critical infrastructure is essential for the functioning of society and the economy. It includes systems like power grids, transportation…

The CIA Triad

This report describes what the CIA Triad is and how important it is in securing ournetworks, the difference between authorization and authentication within a system, and showswhy the Triad is a crucial framework to protect sensitive information in various environments atall times to ensure data security, accuracy, and accessibility. Description of the CIA TriadThe CIA…