Cybersecurity Risk Analyst

The career I have decided to focus on for this assignment is a job that I would like to get into myself with the company I currently work for, as they have a few cybersecurity related jobs to offer and this being one of them. The description for a risk analyst will slightly differ depending…

Hampton Roads Use of SCADA

Technology has a huge impact on how the work an employee is responsible for and how they navigate their way to success. A lot of the way we used to do things and manage a company’s systems have drastically evolved just as rapidly as technology has. I am currently employed at Hampton Roads Sanitation District…

Cybersecurity Resources

When it comes to being in a position of power within a company such as Chief information security officer, there is a lot of responsibility and considerations you must make to ensure the safety of the company and its customers. In this position you must identify the potential risks the company might face from attackers…

Cyber Stress

The article I have decided to relate back to the modules learned throughout this semester, focuses on how an employee’s stress levels may impact their role in cybersecurity. The research conducted throughout this paper was comprised of nearly 230 employees across different organizations such as Healthcare, Retail, Banking, etc. Along with how stress may dictate…

Repercussion of Data Breaches

The article I have decided to review was a study conducted across several different companies between 2002 and 2018. This study reflected on how a breach in data may affect a company’s reputation in a negative or positive way. Before diving into the main study of the article I asked myself from a consumer standpoint…

The CIA Triad

The “CIA Triad” is an important model represented across many businesses in the United States. The model emphasizes three integral principles of cybersecurity, Confidentiality, Integrity, and availability. This is a guiding model of security used by businesses when developing and structuring a security model for their business. These three concepts provided different structures for policies,…