SCADA Systems

Vulnerabilities: The article states that critical infrastructure systems that use SCADA systems face several vulnerabilities (SCADA). One of the vulnerabilities that the article talks about is unauthorized access. The unauthorized access to SCADA software can lead to intentional changes, virus infections, or other issues (SCADA). Other vulnerabilities that may occur would be things such as…

The Human Factor in Cybersecurity

How I would Allocate my limited funds: There are many ways in which I could allocate my limited funds, but there are only a few methods that I would actually use and that seem most beneficial to me. One of the methods I would use would be risk assessment. I would identify what assets I…

Opportunities for Workplace Deviance

Cyber technology has created opportunities for workplace deviance in a various number of ways. Cyber technology has allowed workers to sit in the workplace and do other things besides their actual job. Workers could be on the internet browsing or shopping online instead of doing what needs to be done. Cyber technology can also lead…