Cyber technology has created new opportunities for workplace deviance. One of the new forms is cyber loafing. By using company resources and time for doing non-work-related tasks like using social media or online shopping. The lack of productivity form workers doing this leads to production deviance which effects he bottom line of company production. The…
Author: jbrei002
Ethical Considerations of CRISPR Gene Editing
Gene editing is a dangerous game to play. There are still too many safety concerns and unknows when it comes to gene editing. It also can produce unwanted side effects that could potentially cause problems in the future. Also, just the lack of information of how it will affect future generations from someone who had…
SCADA Systems
SCADA Systems with proper security are an effective method of protecting critical infrastructure. Critical Infrastructure Threats Critical infrastructure has vulnerabilities to cyberattacks and physical attacks. Utilities like thepower grid, water distribution, traffic systems, oil and gas pipelines. They are vulnerable tocyberattacks, where they could be shut down and held for ransom. “In December 2015, the…
The NIST Cybersecurity Framework
Organizations cybersecurity can benefit greatly from this framework. It provides the groundwork to properly set up, improve, or properly maintain an organizations cybersecurity. By doing this we are able to protect a company’s bottom line and protect their ability to innovate and make a profit. By bringing a company’s awareness to their vulnerabilities to a…
The CIA Triad
What is the triad?The CIA triad stands for confidentiality, integrity, and availability. It is a framework that is used to help form information security policies. The three elements of the triad form the fundamental needs of cybersecurity. ” The following is a breakdown of the three key concepts that form the CIA triad: Confidentiality is…