The Internet has a nearly endless amount of information that is constantly growing. This information that is publicly available can actually be quite helpful when it comes to cybersecurity. PrivacyRights.org has a massive amount of information regarding different data breaches. It shows data breach chronology, a data brokers database, and a definitions database, all of…
The CIA Triad, Authentication, and Authorization
What is the CIA Triad? The CIA Triad is a model designed to protect policies in an organization. It stands for Confidentiality, Integrity and Availability. According to an article describing the CIA Triad, It is often referred to as the “AIC Triad” to avoid confusion with the Central Intelligence Agency (Chai). It is a fundamental…
CYSE 201S – Week 2 Journal Entry: The Four Principles of Science related to Cybersecurity.
How The Principles of Science Relate to Cybersecurity There are four main principles of science; Empiricism, Determinism, Parsimony and Objectivity. They each relate to cybersecurity in one way or another. Empiricism emphasizes observation and evidence. One cannot rely on opinions working in cybersecurity. Determinism allows specialists to predict what might occur in cybersecurity, but said…
CYSE 201S – Week 1 Journal Entry: NICE Workforce Framework for Cybersecurity
The NICE Framework represents some of the categories that all cybersecurity jobs fall into. There are a significant number of areas the NICE Framework covers. Protection and Defense is the area I would like to focus on for the start of my cybersecurity career. This is one of the more interesting parts of cybersecurity to…