As the CISO for a publicly traded company, it is vital to ensure availability for my systems. In order to do this I would implement data backup and recovery, redundant infrastructure, employee training, and regular testing. Data backup and recovery ensures that information and resources are preserved even if incidents were to happen. If data…
Author: hmaca002
The NIST Cybersecurity Framework
The NIST Cybersecurity Framework benefits organizations by setting guidelines that improve cybersecurity in the workplace. It does so by helping organizations deal with risks in a structured and organized way. It gives priority to the most critical threats that need immediate attention. The framework also helps with effective communication as it provides a common language…
The Human Factor in Cybersecurity
Balancing a limited cybersecurity budget requires a strategic blend of investing in employee training and essential cybersecurity technologies. This combination maximizes defenses against evolving threats while ensuring a cost-effective and robust security posture for the organization. Introduction In the ever-evolving landscape of cyber threats, the role of Chief Information Security Officers (CISOs) is becoming increasingly…
SCADA Systems
This article investigates how Supervisory Control and Data Acquisition (SCADA) systems play a crucial role in monitoring and managing essential industrial processes. It highlights the ongoing efforts to strengthen systems against cyber threats, emphasizing the crucial role SCADA applications play in mitigating risks to protect vital infrastructure. Vulnerabilities in Critical Infrastructure Critical infrastructure, encompassing water…
The CIA Triad: The Balance of Confidentiality, Integrity, and Availability
The CIA Triad: The Balance of Confidentiality, Integrity, and Availability The CIA Triad is a vital framework for cybersecurity that serves to protect sensitive data. It is comprised of the following: Confidentiality, Integrity, and Availability. This research paper delves in deeper and explores the significance of these principles and will also discuss the difference between…
Module 14
Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. https://clario.co/blog/illegal-things-you-do-online/ This article served as a revealing guide to various activities on the internet that may be illegal, prompting…
Module 13
A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using…
Module 12
Read this sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. https://dojmt.gov/wpcontent/uploads/Glasswasherparts.com_.pdfLinks to an external site. Economic Theories: Social Science Theories:
Module 11
As a Cybersecurity Analyst, social behaviors play a significant role in understanding and mitigating potential threats. The presentation delves into the intersection between human behavior and cybersecurity, highlighting how individuals’ actions impact digital security. Cybersecurity analysts frequently deal with the human element of security breaches, particularly in the context of social engineering. This tactic exploits…
Module 10
Read this and write a journal entry summarizing your response to the article on social cybersecurity https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site. In reading Lt. Col. David M. Beskow and Kathleen M. Carley’s article on social cybersecurity, I was intrigued to find out about the shifting landscape of warfare. The article showed the evolution from traditional…