Journal Entries

Journal entry #1  The categories from the NICE workforce framework that I would want to force on for my carrer is the investigation area. The investigation area has specialties that “investigates cybersecurity events or crimes related to information technology systems, networks, and digital evidence. I find both the specialty areas of cyber investigation and digital…

Possible Ethical Considerations for Bio Cybersecurity

  Possible ethical considerations in Bio Cybersecurity could include do no harm and informed consent. For example in the case of digitizing DNA, do no harm should come into play. The way to do no harm could be a consideration is to make sure the participant is protected from all harm at all cost. With that…

Additional Technology over Training  

In today’s cyber world, There are many unknowns due to everything constantly changing. In fact, by the time I graduate most of what I have learned will be outdated. With that being said, with a limited budget, I would divide it, additional technology 70% and training 30%. Additional Technology  If I had a limited budget…

SCADA Systems

Supervisory Control and Data Acquisition, Also known as SCADA, is a software application that is used to control infrastructure processing systems. Critical infrastructures are very vulnerable to cyber attacks due to the fact they are dependent on computer systems to function. SCADA systems understand this and have Attack Prevention Strategies Critical Infrastructure Vulnerabilities  Critical Infrastructure…