CHILD CYBERPORNOGRAPHY AND SEXUAL EXPLOITATION OF CHILDREN ON THE INTERNET
Treatment Behind Bars – The New Asylums: Jails Swell with Mentally Ill
Reaction/Response Essay Gary Fields and Erica Phillips article titles Treatment Behind Bars – The New Asylum: Jails Swell with Mentally Ill is an equally eye opening and important piece on a decades old problem that is still relevant to today. The article highlights the dire extent of mentally ill individuals being held and treated within America’s…
Effects of School Funding on Graduation Rates Amongst Students in Low-Income Neighborhoods
Public schools in the United Sates are one of the most unequally funded of any other nation. Public schools are consistently suffering significant funding disparities as certain school counties receive more government funding than others. This being said, schools in lower income neighborhoods often receive less funding than those in wealthier areas (How money matters:…
Expository Essay: Informal vs. Formal Social Control
Social control refers to the methods and mechanisms that each society used to regulate and determine group and individual behavior, ensuring that those within the society conform to its social norms, rules and laws. Social control is a key part within societies and determining how a society functions by ensuring order, conformity and stability amongst…
The Human Factor in Cybersecurity
As a Chief Information Security Officer, balancing funds between training and cybersecurity technology requires strategic decision making. Both training and cybersecurity technology are crucial in mitigating risks and lowering human risks. The main thing to do is to figure out what risk are higher and what training and technology can mitigate those risks. Prioritizing risks…
SCADA Systems and the Vulnerability of Critical Infrastructure Systems
Critical infrastructure systems such as power grids, water supply, communications systems and more are subject to being at risk of cybersecurity attacks. These critical infrastructure systems hold high vulnerability for cybersecurity attacks and systems need to be put in place to protect them from such. These infrastructures are crucial to society and governments and the…
The CIA Triad
What is the CIA Triad? The CIA Triad The CIA Triad is a model of rules and guideline policies used for information security. Being formed over many years as early as the 1970’s, the triad consists of confidentiality, integrity and availability (Chai 2022). Confidentiality The confidentiality component in the triad refers to the security of…