Scientific principles such as relativism, objectivity, parsimony, empiricism, ethical neutrality, and determinism are all related to cybersecurity. Cybersecurity and scientific principles rely on human behavior and characteristics to determine the cause and fix a problem. Relativism Relativism is how all… Continue Reading →
Websites are extremely easy to make. Hosting providers such as GoDaddy, Wix, Weebly, and WordPress make it seamless to setup a website in minutes. However, is it straightforward to tell if a website is real or not? The answer is… Continue Reading →
A wide range of malicious activities that are carried out through human interactions are referred to as “social engineering.” It induces users to commit security breaches or divulge private information through psychological manipulation. This begs the question: can social engineering… Continue Reading →
When a system is compromised, hackers have their reasons for why they want data from the system. The motives could be for money, entertainment, political, etc. There are seven generalized motives that hackers have that can be ranked from one… Continue Reading →
Maslow’s Hierarchy is a hierarchy of needs that all people have. The hierarchy can be broken down into five categories: physiological, safety, belongingness and love, esteem, and self-actualization. By moving into the 21st century, the hierarchy is now applying to… Continue Reading →
PrivacyRights.org gathers information on data breaches and advocates for better privacy laws to prevent future breaches from occurring. Researches can also step in to perform a variety of tasks such as interviewing the attackers and notifying the victims of the… Continue Reading →
The NICE, National Institute of Cybersecurity Education, Framework is aimed to help employers develop their own cybersecurity workforce. The Framework allows for people to specialize in certain areas which creates expertise in the field of study. What is the NICE… Continue Reading →
The human factor is human interaction with technologies and systems. However, there are risks involved as human interactions are prone to errors that can compromise the confidentiality, integrity, and availability of systems. This brings the question: should there be more… Continue Reading →
Critical infrastructures run the necessities for people, businesses, and countries to run. Critical infrastructures have serious vulnerabilities that can be devastating. SCADA systems play a role in mitigating these vulnerabilities and exposures. What are Critical Infrastructures? Critical infrastructures include physical… Continue Reading →
The three letters in the CIA Triad stand for Confidentiality, Integrity, and Availability. The Triad forms the foundation and fundamental components of cybersecurity, security development, and security research. The Triad provides a foundation for Authentication and Authorization, which relies on… Continue Reading →
© 2025 Brandon Burke — Powered by WordPress
Theme by Anders Noren — Up ↑