Journal 3

Social cybersecurity is one of the biggest subdomains in cybersecurity nowadays and it one of the biggest issues we have today in our nation state.  Social cybersecurity is affecting all levels of warfare, it also looks at and takes into account the social, cultural, and political outcomes. There is an extremely big information warfare going…

Workplace Deviance

The multitude of opportunities that technology has created for workplace deviation is crazy, and there is so much more crime and other things that could go wrong with that. First workplace is when an employee starts to do plenty of actions that break the rules, along with not doing their job, and even breaking property….

Protecting Availability

If I was the Chief information security officer at Elijah’s Engineering Systems, there would be various different processes that I would implement to ensure the most security for the business along with making sure that our information is ready and available at all times. Physical security is extremely important when it comes to making sure…

SCADA Mitigations

Critical Infrastructure Vulnerabilities With technology evolving everyday cyber attacks are as well. One of the most vital pieces of our lives is making sure that critical infrastructures are safe and protected so that we could have certain things when we need it like water and electricity, but with that having vulnerabilities it can also be…

CIA Triad

The CIA Triad is a information security that is known across the whole Cybersecurity world. This acronym which stands for Confidentiality, Integrity, and Availability is one of the most important steps in a security model and to any cybersecurity operation under a company and each component is special and integral to making sure you’re safe….