There are many ways that cyber technology has created opportunities for workplace deviance which can effect security and productivity. Cyber deviance can range from behavior that violates company rules to potentially harming the organization or its members. One form of workplace deviance that I see most often is excessive personal use of the internet while…
Exploring the Security Challenges of SCADA systems and Their impact on Infrastructure
The SCADA (Supervisory Control and Data Acquisition) system is an essential component to safeguarding critical infrastructure and mitigating the risks associated with critical infrastructure systems. SCADA is very helpful because it provides real-time monitoring, automation, and control which allows operations to detect potential threats or issues like equipment failure or cyber threats, before they’re able…
A Deep Dive into the CIA Triad
The Confidentiality, Integrity, and Availability (CIA) triad is a core principle of cyber security that was designed to guide the development and implementation of security policies. It ensures that data is protected from unauthorized personnel (Confidentiality), maintains accuracy (Integrity), and is accessible to users whenever information is needed (Availability). This fundamental framework used in cyber…