Article review #1

Dante Scaramazzo CYSE201S 10/1/2022 Article Reviews Journal 1: International Journal of Cyber Criminology  “Cyber Violence with Biosocial Perspective and The Role of Preventative Legislative Mechanism”  By: Slamet Suhartono             Suhartono’s main research question in writing this article was, “to know how the administrative or legal mechanism of a nation could attempt to understand the biosocial perspectives…

How might researchers use this information to study breaches? 

Researchers might use this information from the site to study breaches because all of the types of breaches and types of businesses are listed and explained. This site is a hub of information, with all the resources you need as well as advocacy. The site believes that everyone deserves the opportunity to be informed. You…

 Explain how the principles of science relate to cybersecurity

The science of cyber security is the study of relations between attributes, structures and dynamics of: violations of cyber security policy; the network of computing devices under attack; the defenders’ tools and techniques; and the attackers’ tools and techniques where malicious software plays the central role. The science of cybersecurity develops a coherent family of…

The Legal System Response to Technological Advancements Write-Up

Technology is so strong with the internet that news and posts can go viral in seconds leaving our government and legislative bodies with predicaments on what to do and how to address them. There are now pages of local cities in states around the country that have twitter accounts and post on them generally to…

SCADA Systems Write-Up

SCADA is a system of hardware elements as well a system of software that allows industrial organizations to monitor, gather, and process real-time data. Industrial control systems, such as SCADA systems and other OT systems, serve as the foundation for critical infrastructure. The cyber security infrastructure needs to be at the highest level for its…

CyberSecurity in the Biological Sciences Industry Discussion Board

From my week 5 readings especially, it is so important to know that your lab and personal information like our DNA must be max protected at all times. At first, I would conduct a risk assessment so I can determine the vulnerabilities among my lab as well as accounts holding personal information such as the…