How has cyber technology created opportunities for workplace deviance?

The phrase “cyber deviance” refers to employees’ voluntary use of a company’s Internet connection for non-work-related reasons during working hours. Distracting behaviors like these could increase or decrease employee job satisfaction or cause productivity losses(What is Cyberdeviance). While a more digital workplace fosters innovation and progress, it poses serious risks to companies, such as destructive…

Ethical Considerations of CRISPR Gene Editing

CRISPR-Cas9 is a novel technology that allows geneticists and medical researchers to edit regions of the genome by removing, inserting, or modifying DNA sequences. In the field of research, it is currently the most simple, flexible, and precise approach to genetic manipulation. The ability to edit DNA in human embryos could one day prevent some…

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework aids businesses and organizations of all sizes in better comprehending, controlling, and reducing their cybersecurity risk while securing their networks and data. The Framework is completely optional. It provides them with a summary of best practices to assist them in choosing where to concentrate their efforts and resources for cybersecurity protection….

The Human Factor in Cybersecurity

With the increase of technological advances, human error whether intentional or unintentional continues to contribute to many cyber threats. This paper discusses how can the Chief information security officer or CISO balance the tradeoff of training and additional cybersecurity technology in an organization with a limited budget. What is a Chief information officer? Chief information…

SCADA Systems

Critical infrastructure systems are critical to our daily operations, but they face numerous threats. This paper addresses a few of the threats that our critical infrastructure systems face and how SCADA systems help mitigate those threats. Vulnerabilities associated with critical infrastructure systems A hacker in Florida attempted to raise the sodium hydroxide content from 100…

The CIA Triad

The article “ What is the CIA Triad? Definition, Explanation, Examples” by Wesley Chai focuses on the three main components of the CIA triad, which are confidentiality, integrity, and availability. The article also touches on the importance and examples of the CIA triad. Description of the CIA Triad The acronym CIA stands for confidentiality, integrity,…