One specialty that appeals to me most is digital forensics. This area intrigues me due to collecting the evidence after the attack and maintaining/preserving this for the officials to assist in the investigation. Looking into what can be found left… Continue Reading →
This author views technology as evil. He believes technology is a threat that we are associating ourselves with. It was believed at one point that technology was a goal or striving point for progress, but now we are hidden behind technology. Jonas… Continue Reading →
Technology is constantly changing every day just like the world is constantly evolving. The meaning behind the “short arm of predictive knowledge” is that instead of looking way down the road one should focus on what is in front of… Continue Reading →
Technology in a sense has become a crutch. Many people believe and appear to be more confident behind a screen. Bullying in school is still very sadly common, but that then translates online. Social media has made it so that… Continue Reading →
If you look at most job requirements for a cybersecurity position the main ones listed are Security +, Certified Ethical Hacking, Certified Information Systems Auditor, etc. Coursera also offers many cybersecurity certificates that people have stated have helped their endeavors…. Continue Reading →
Things to consider when deciding what safeguards to use vary depending on the organization’s size or capabilities, the technical infrastructure, cost, and risk factors. Administrative, physical, and technical safeguards are recommended to protect ePHI. Administrative safeguards can include ensuring security… Continue Reading →
Technology has limited the interactions victims experience with their offenders. A robbery can bestealing company information or files without leaving their home. While the name staysthe same, the description and actions are not. The actions are still illegal such as… Continue Reading →
Cybersecurity framework is not required for all organizations or sectors. All federal organizations are required to use the framework, but only some state companies such as insurance ones are mandated to. The framework is just that, a frame or guide,… Continue Reading →
Cybercrimes and the criminal justice system do encounter each other. Many believe that due to cybercrimes being committed on the internet or through a computer, it is not punishable in court or do not apply to a court system. This… Continue Reading →
SCADA stands for Supervisory Control and Data Acquisition, and it is used to control, monitor, and record events of systems. This system is very useful, especially for many industrial organizations. It allows people to access the logs and records recorded… Continue Reading →
Since the popularity of cybersecurity has increased so has the threat to many engineering technology systems. Not only can this apply to surveillance systems, operating systems, or banking. Cyber attacks can affect factories for example. One incident of this is… Continue Reading →
The reason for cryptography is to securely send messages and to make sure the message sent is what the receiver is getting using math and technology combined. It can involve encrypting plaintext into ciphertext and sending it and then the… Continue Reading →
Part 1: Based on the reading alone by IBM millennials ages 20-36 seem to have less concern for password safety than those 55 years and up. Many millennials prefer convenience over security based on the survey given. It seems the… Continue Reading →
To start off figuring out how to spend the money in a business, I believe best practice would examine all of the protections needed based on inventory. Certain protections do not need to be purchased if that type of product… Continue Reading →
Provide your understanding of this report on Industrial Cybersecurity. Also, what are the impacts of a security breach on a company? Are organizations prepared for this type of threat? According to the article from my perspective, companies overall underestimate the damage or… Continue Reading →
© 2025 Jasmyn Wilhelm — Powered by WordPress
Theme by Anders Noren — Up ↑