Author: djohn163
Journal Entries
Journal entry #1 The categories from the NICE workforce framework that I would want to force on for my carrer is the investigation area. The investigation area has specialties that “investigates cybersecurity events or crimes related to information technology systems, networks, and digital evidence. I find both the specialty areas of cyber investigation and digital…
Possible Ethical Considerations for Bio Cybersecurity
Possible ethical considerations in Bio Cybersecurity could include do no harm and informed consent. For example in the case of digitizing DNA, do no harm should come into play. The way to do no harm could be a consideration is to make sure the participant is protected from all harm at all cost. With that…
Additional Technology over Training
In today’s cyber world, There are many unknowns due to everything constantly changing. In fact, by the time I graduate most of what I have learned will be outdated. With that being said, with a limited budget, I would divide it, additional technology 70% and training 30%. Additional Technology If I had a limited budget…
SCADA Systems
Supervisory Control and Data Acquisition, Also known as SCADA, is a software application that is used to control infrastructure processing systems. Critical infrastructures are very vulnerable to cyber attacks due to the fact they are dependent on computer systems to function. SCADA systems understand this and have Attack Prevention Strategies Critical Infrastructure Vulnerabilities Critical Infrastructure…