An organization gains from using can measure the risk, costs, and benefits of cybersecurity strategies and steps. The more rational, practical, and valuable its cybersecurity approach and investments will be the framework designed for other existing organizations and cybersecurity operations.NIST framework communicates cybersecurity requirements with stakeholders. NIST framework users are finding establishing profiles highly effective…
The course concept
This class helped me understand how technology is related to cybersecurity from an interdisciplinary and the foundation on which cybersecurity is built. This course helped me understand that Cyber technology creates opportunities for criminal behavior and cyber policies and frameworks.Identify how cultural beliefs interact with technology to impact cybersecurity strategies and how cyber systems’ components,…
From Verbeek’s writing (Mod 6, Reading 4) Designing the Public Sphere: Information Technologies and the Politics of Mediation
How should markets, businesses, groups, and individuals be the regulated or limited difference in the face of diminishing state power and the intelligification (Verbeek, p217) and networking of the material world?After reading Verbeek’s writing in module 6, I have decided that markets, businesses, groups, and individuals should be regulated differently. Markets should be held to…
Write Up – The Human Factor in Cybersecurity
During this week’s reading, you’ve been exposed to different points of view regarding human contribution to cyber threats. Now, put on your Chief Information Security Officer hat. Realizing that you have a limited budget (the amount is unimportant), how would you balance the tradeoff of training and additional cybersecurity technology? That is, how would you…
SCADA SYSTEM
SCADA SystemSupervisory control and data acquisition (SCADA) systems are widely used to control power plants’ machinery and manage city traffic lights. The SCADA system increases the efficiency of running an organization, reduces wastage and downtime, expands productivity, and extends the life of the equipment (Robles, n.d). If the weaknesses in SCADA remain unchecked, they cause…
The disiplines cryptographer and chief information security officer (CISO).
Cryptographer Becoming a cryptographer requires one to be well conversant with mathematical principles because they are always required when producing encryption systems that are strong enough. Furthermore, it requires one to be good and conversant in programming languages and coding programs, which are crucial while conducting several tasks in the field. Cryptographers should also be…