In this article, we will be discussing the problems with law-making bodies and their slowness to react to evolving technologies and how to regulate and reduce internet crime. I believe that using organizations whose jobs are to protect the people of the USA from domestic and foreign threats should be utilized to their full potential….
Author: ecord004
The CIA Triad
The CIA triad is a security model that is focused on three areas of cyber security and data protection and management. The three key pillars of the CIA Triad are confidentiality, integrity, and availability. Confidentiality is the idea that only authorized users and or processes are the things that can be accessed and modified. For…
Vulnerability in SCADA Systems
SCADA systems are the brains in our functioning society; they control and communicate with hardware and software to run our everyday lives. For example, if a SCADA system at a power plant there would be no power until the issue was fixed. One of the major problems with the security of a SCADA system is…
The NIST Framework DB (01/23/22)
Question:What benefit can organizations gain from the NIST Cybersecurity Framework, and how would you use it at your future workplace? My Response: The NIST Cybersecurity Framework is a general guide on how a company should understand its current implementation of cybersecurity and how it could implement a new cybersecurity protocol. There are a lot of…