These three examples of websites are fictitious and are not genuine website that contain valid information, nor contain valid URLs. https://www.thebeaverton.com/This website consists of information that is incorrect, or contains disinformation. The website was designed as a tool to be able to spot misinformation and articles that are not true. The resources are not credible….
Journal 5-Individual Motives of Cybercrime
1- For moneyI believe that the majority of cybercrimes are committed because of financial gain. Financial gain is a huge motive when it comes to individuals or groups committing cybercrime and this is why I believe that it makes the most sense to have at the first ranking. Money is the root of all evil,…
Journal 4-Maslow’s Hierarchy of Needs and Social Media Usage
Maslow’s hierarchy of needs within this journal is ranked from lowest to highest during explanation. In relation to cyber behavior, Maslow’s hierarchy of needs can be related to the use of social media and other forms of digital technology. Physiological needs – I personally feel that in this time period of social development, all forms…
Journal 3-Data Breaches
When it comes to data breaches, there are many different types of incidents and different situations regarding them. The information that is excavated from each incident can be used to further prevent and assess future breaches of data. Researchers can use the conducted information to inaugurate new solutions and policies to further strengthen cybersecurity within…
Journal 1-NICE Workforce Framework
What is the NICE Workforce Framework?The NICE Workforce Framework is a guideline of resources garnered to help develop a highly efficient cybersecurity workforce. The document stabilizes proper knowledge, processes, and skills used to help develop and maintain certain areas of a cybersecurity workforce. When it comes to the NICE Workforce Framework, certain areas I would…
Protecting Availability
CHRISTOPHER HOSSELEEnsuring availability of systems for a company is one of the most important factors of cybersecurity because it grants data access to authorized users when ultimately needed. Strengthening the process of availability protects classified information from being accessed by unauthorized individuals while also keeping data available at all times. If I was a CISO…
The Human Factor in Cybersecurity
What is Human Contribution to Cybersecurity? Human contribution within cybersecurity organizations performs the most important part when it comes to balancing a strong workforce. These factors can consist of adequate training, extensive knowledge, and formal policy procedure (What Is an Insider Threat). Humans are the backbone to ensuring that issues within these organizations do not…
SCADA Systems
SCADA Systems, otherwise known as Supervisory Control and Data Acquisition, are methods of control that direct and detect physical or digital vulnerabilities within systems of infrastructure. These systems are analyzed by technological instruments which process data and divert information to human operators who analyze the data information. SCADA Systems can also be defined as monitoring…
The NIST Cybersecurity Framework
The NIST Cybersecurity Framework document was produced as a list of standards and procedures used to better prioritize the issues of cybersecurity risks, adapting ways to better prevent these risks and innovate systems to enhance the requirement of cybersecurity within an organization. The NIST Cybersecurity Framework is a more inexpensive way to ensure management of…
The CIA Triad
The CIA Triad in Summary Confidentiality, integrity, and availability are key functions of regulating a company’s information security and ensuring proper policies and regulations are being followed. These three topics are implemented together to create what is known as the CIA Triad. The CIA Triad had been in constant development over time due to the…