Career Paper

The career I have chosen to take a closer look at is the job of a chief information security officer (CISO). This job is a high-level position at major companies that is tasked with keeping a company’s digital information safe from attacks. They use advanced information security and managerial work that provides direction and guidance…

Generation Y & Z Article Review

For my article review I read “A reverse digital divide: Comparing information security behavior of Generation Y and Generation Z adults” (Debb et al. (2020)). In this article the question that researchers were trying to answer was if there was a relation between if what generation someone was born in affected their digital information security…

Article review #1: Romance scams

For my article review I read “Do You Love Me? Psychological Characteristics of Romance Scam Victims” (Whitty (2018)). In this article the question the researchers were trying to find out was if there was a relation between a person’s characteristics and their susceptibility to mass marketing fraud, more specifically, romance scams. The experiment was done…

Hierarchy Of Cyber Needs Journal Entry

Abraham Maslov’s theory states that all human needs are situated on a hierarchy. With the lower levels needing to be met before we move onto the higher levels. In the case of technology, we have our own hierarchy of levels that relate to each of our normal human needs. On the lowest level, the physiological…

Principles of Science & Cyber security Journal Entry

Relativism The principles of science can be related to cyber security in a multitude of ways. The first Term that heavily relates to cybersecurity is relativism. Relativism, in this context, is described as all things being related to one another. An example of this can be found in some of the systems that we are…

Human Factor In Cybersecurity

What I have learned is that human behavior is more of an integral part of cybersecurity than I initially thought. On the other hand the digital aspect of cybersecurity is also important to maintain the integrity and efficiency of the system.  How I would focus resources Personally, what I would do is focus most of…

SCADA Systems

Vulnerability In the twenty-first century, technology has become deeply interlaced with our society and infrastructure. There are many important technological systems that help run our modernized world and are used in electricity plants, traffic light systems, and even nuclear power plants. Since the failure of these systems has such a high risk associated with them…

CIA Triad Write-Up

Surprisingly, the CIA triad has nothing at all to do with the U.S. Central Intelligence Agency. The CIA triad are the principles that information security rests upon. As referenced in the CIA triad article by Josh Fruhlinger, CIA is an acronym that stands for confidentiality, integrity, and availability. Confidentiality is used to make sure that…