The “Short Arm” of Predictive Knowledge

I now realize that we cannot foretell our future repercussions or issues due to reading “Short Arm.” We can’t predict what will happen since new things emerge every day, which applies to everything. So, in this situation, when it comes to cybersecurity, we must be prepared for any crisis. More and more risks are emerging…

The Human Factor in Cybersecurity

When it comes to this kind of tradeoff, you must think about what’s best for the organization. When you have people quickly hacking into databases and stealing crucial information, you would want to be sure that you have the best security measures for the organization. Its, also vital that you make the right choice for…

Workplace Deviance

Workplace deviance has increased in the cybersecurity field and has been a problem for a long time. In the Cybersecurity technology field, deviance is usually caused by disgruntled employees that may have a problem with the organization or the people there. With all types of technology in this generation, anyone can use them to their…

CISO

If I were the CISO for a public traded company, I would include the best security measures systems. One protection I would like to include in my organization is to have a system that secures all network and wireless points for the organization. This would be great to implement because it will ensure that not…

SCADA Systems

As stated in the article SCADA Systems, “Security of SCADA-based systems is being questioned, as they are potential targets to cyberterrorism/cyberwarfare attacks.” Though SCADA is an excellent system to use in the cybersecurity field, it has many vulnerabilities and risks. The first vulnerability could be that the system could be threatened by virus infections, manufactured…

C.I.A Triad-Write Up

The CIA Triad was developed in 1998 by Donn Parker is made up of three components: confidentiality, integrity, and availability. Confidently deals “authorized users and processes should be able to access or modify,” integrity deals with “data that should be maintained in a correct state, and nobody should be able to improperly modify it, either…

Cybersecurity: Discussion Board 1

After reading the document “50 Cybersecurity Titles That Every Job Seeker Should Know About”, the main disciplines found in the cybersecurity field are computer engineering, computer science, information systems, software engineering, and information technology. Those are the main skills/disciplines that every worker in the cybersecurity field needs. The two jobs I found interesting and researched…