The cybersecurity job that I have chosen to research is a blue team member. A blue team member is in charge of defending the system of a company in simulated hackings from the red team, a team hired by a company to attempt to hack their systems, or any real threats from external sources (Tauchman,…
Importance of Surveys in Criminology
Surveys are a great way to obtain data on various different statistics and their relationships with one another. Directly asking a selected group of people questions on a subject and seeing the patterns in their responses is a very useful tool to have in research. This is the main reason why surveys are used so…
Three Real and Three Fake Websites
Websites are all designed with an intended purpose. Some of these uses are to entertain, inform, sell a product, and the list goes on and on. One of the reasons that some websites are created are for malicious purposes, such as fooling the viewer into believing they are on a legitimate website when they are…
How Do the Principles of Science Relate to Cybersecurity
The principles of science are the most basic guidelines for all science to follow. They include the principles of integrity of knowledge, collegiality, honesty, objectivity, and openness. These principles help make sure that the field of science is proper and as up to date as possible. These principles also relate to the field of cybersecurity.Cybersecurity…
NICE Workplace Framework
The NICE workplace framework serves to categorize the plethora of jobs that fall under the branch of cybersecurity. The framework includes seven distinct categories under which many jobs fall. The seven categories listed are: analyze, collect and operate, investigate, operate and maintain, oversee and govern, protect and defend, and finally security provision. These different categories…
Workplace Deviance
Workplace deviance has always been an issue that companies must deal with, but due to the increase in the use of cyber technology, workplace deviance has become much more safe for the deviant employee, more prevalent, much easier and much more dangerous. Technology allows employees to more discreetly harm the company through leaks or other…
The Human Factor in Cybersecurity
As the field of cybersecurity continues to grow and evolve, the need to balance both the level of technology with human training becomes more and more important. On one hand, cybersecurity needs to have the best tech available to function at its best. On the other hand, if people are not properly trained and involved…
CIA Triad
The CIA Triad is a information security system that was first properly established in 1998, although it started forming as early as 1976. This model helps cybersecurity workers determine what are the most important factors in a system, and what they should do to successfully implement the three core concepts used in this model. The…
Roles of a CISO
The CISO has a lot of responsibility in the world of cybersecurity, being described by Wesley Mullins, A CIO and CISO, as “the ultimate protector”. This means that the CISO must make decisions regarding all 3 core concepts of the CIA triad, confidentiality, integrity, and availability. The aspect that we will be talking about today…