How has cyber technology created opportunities for workplace deviance? The increase in cyber technology has created various opportunities for workplace deviance. Cyber technology can lead to big distractions for workers who spend time browsing social media or non-work-related websites during their working hours. Many companies give employees computers, which they use during working hours to…
The Human Factor in Cybersecurity
This report outlines how, as a Chief Information Security Officer operating on a limited budget, how I would balance the tradeoff of training and additional cybersecurity technology. It explains my strategy for allocating limited funds, with detailed reasoning, to ensure no cyber threats. Groundwork As a Chief Information Security Officer I would first start by…
Critical Infrastructure Vulnerabilities and SCADA Mitigation
This report explains the vulnerabilities associated with critical infrastructure systems and the importance of it, what SCADA is, and how SCADA can be used to mitigate these infrastructure vulnerabilities. The Importance of Infrastructure and Its Vulnerabilities Critical infrastructure is essential for the functioning of society and the economy. It includes systems like power grids, transportation…
The CIA Triad
This report describes what the CIA Triad is and how important it is in securing ournetworks, the difference between authorization and authentication within a system, and showswhy the Triad is a crucial framework to protect sensitive information in various environments atall times to ensure data security, accuracy, and accessibility. Description of the CIA TriadThe CIA…