Data Breach Research(CSYE201)

Researches may pull information from PrivacyRights.org database pertaining to data breaches in order to access mass amounts of data for analysis. The spreadsheet available for download currently has information on 9016 data breaches. Each line holds data for: The breached company, the city and state of the company, type of breach(insider breach, credit card fraud,…

The Principles of Science and Cybersecurity(CYSE201)

Relativism, from a systems perspective, can mean that changes in one system lead to changes in other systems. This relates heavily to cybersecurity because as we continue to make rapid technological advancement, we also rapidly increase the amount of potential attack methods, and increase the attack surface, that attackers can use.   Determinism relates to cybersecurity…

The NICE Framework(CYSE201)

An area of least appeal to me would be the specializations within the “Oversee and Govern” category. I am more interested in the more hands-on technical work(at least within my early career) in order to accrue the experience needed to transition to other roles. While I would likely enjoy any one of the roles within…

The “Short Arm” of Predictive Knowledge

Given the “short arm” of predictive knowledge, the cyber-society must have a unique approach to the development of cyber-policy and infrastructure. Jonas states that “…the human good, known for its generality, is the same for all time, its realization or violation takes place each time, and its complete locus is always present.” My interpretation of…

The CIA Triad

The CIA triad is a widely-known cybersecurity model. CIA is actually an acronym that stands for the three parts of the triad. They consist of Confidentiality, Integrity, and Availability. These three major components come into play when cybersecurity personnel go about securing their data, websites, and other online systems. The first part of the triad,…

Workplace Deviance

Cyber Technology has created and evolved new and old means of workplace deviance. Workplace deviance can be described essentially as a worker breaking the rules or not upholding their responsibilities. Whether that be neglecting their job due to distractions or purposefully causing harm to their corporation, cyber technology has greatly increased the ease in which…

Protecting Avaliability

Being the CISO for a publicly traded company is a massive responsibility with the company, as well as shareholders, relying upon a well formulated security thesis in order to protect the information and availability of the corporation. If I were to be a CISO focused on protect the consistent availability of a company’s systems, I…

The NIST Framework

I think that not only is the NIST framework a benefit to any company, but an absolute necessity. Establishing the framework into an organization creates a united plan, or guideline, to follow in order to meet cybersecurity needs across the board. In this day and age where everything is run with technology, having no or…