Protecting Availability

A CISO is responsible for developing and effectively maintaining an organization’s information security. A publicly traded company makes much of its information available to the public. If I were the CISO for a publicly traded company, I would identify all potential vulnerabilities, such as unauthorized access and implement security procedures. This would help to keep…

Opportunities for Workplace Deviance

Workplace deviance is voluntary behavior that violates significant organizational norms that threaten the company’s or employee’s security. Having access to technology makes it easier for companies’ resources to be misused. Some examples of cyber deviance include identity and data theft, internet fraud, and hacking. These can all be considered when thinking of workplace deviance. Hacking…

SCADA Systems Write-Up

This paper includes and explanation of what SCADA Systems are and how they work. Along with a description of the vulnerabilities associated with these systems. It will also cover the role that SCADA applications play in mitigating risks.  SCADA Systems The acronym SCADA stands for, supervisory control and data acquisition. This acronym is used to…

CIA Triad Write-up

What is the CIA Triad?The CIA Triad is a model that is designed to guide policies for information security within an organization. The letters CIA stand for confidentiality, integrity, and availability. Confidentiality is the practice of ensuring that personal information and sensitive data are kept protected. Integrity is how the data can be trusted, from…