Data Breach Chronology

The Privacy Rights website provides a tool, called the Data Breach Chronology, with different numerical information through graphs and maps. This was designed to help advocates, policymakers, journalists, and researchers understand numerous data breaches within the U.S.  With this, researchers can explore different aspects of data breaches and how they impact corporations, businesses, or even…

Cybersecurity & The Principles Of Science

Cybersecurity is an applied science itself. However, looking at this science from a social science view, there are a couple that we adhere to relativism, objectivity, parsimony, empiricism, ethical neutrality, and determinism. Relativism connects and allows us to see the developmental changes with the technology today. Also, how society is advancing and adapting to these…

NICE & The Workforce

Choosing to be a pen tester or cryptographer consists of critical thinking to see what is going on within the network or networks. Some areas that may be suitable and that I would want to focus on with these careers are analyzing, investigating, collecting, and operating. I can also see a bit of protection and…

Ethical Considerations of CRISPR Gene Editing

I believe that CRISPR Editing can be a problem and benefit in today’s society. This new genetic modification has been tested by numerous scientists in which this technological advancement can help with numerous traits in prevention of disorders. However, this can also breed negative impacts and ethical considerations if not handled responsibility or secured properly….

The “Short Arm” of Predictive Knowledge

Discussion: How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge? In today’s time, technology is constantly being developed with new features and enhancements. Now with AI being present, we don’t exactly know how their features work since it’s constantly being updated with new lines of code. However,…

Opportunities for Workplace Deviance

Discussion: How has cyber technology created opportunities for workplace deviance? Cyber technology creates many opportunities for threats within the organization.This makes it difficult to catch whoever the employee is since all these acts are done through computers. Cyberdeviance is defined as inappropriate or criminal behavior in a digital context(Oakly and Salam 2012). According to Venkatraman…

SCADA Systems

Destiny Hale March 21, 2023 SCADA systems are used today to maintain infractures processes within an industrial facility. Within this system comes different interfaces or software that help regulate data or provide real-time results. In this write-up, we’ll find out how a SCADA system operates, what vulnerabilities it encounters, and what it takes to mitigate…

CIA Triad

Destiny Hale February 12, 2023 The CIA Triad is a method that is commonly used within the field of cybersecurity. In this write-up, I’ll be discussing what the CIA Triad is and how it applies in everyday life. Also, distinguishing two other concepts that are a part of this system with examples of each.  What is…

The NIST Cybersecurity Framework

Discussion: What benefit can organizations gain from using this framework, and how would you use it at your future workplace? The NIST framework serves as a blueprint for organizations as in their structure of Cybersecurity programs. A couple of benefits that organizations can gain from utilizing this guideline is more flexibility and it’s adaptable. This…