Opportunities for Workplace Deviance How has cyber technology created opportunities for workplace deviance? “Information technology does make it easier to be deviant. Though with the implementation of workplace controls such as monitoring of actions being done as well as whitelisting/blacklisting websites there can be a strong control over distractions. This control over workplace efficiency falls…
Writing Assignment – Human Factors
Joemar Zayas Duran (UIN 01157876) CYSE 200T (CRN 16378) November 8, 2024 Background Companies do not have unlimited funds for cybersecurity, therefore there needs to be assessments done to evaluate which things deserve fund priority to limit damages from cyber threats. A common issue that circumvents tight security measures is the misuse of information technology,…
Writing Assignment – SCADA
Joemar Zayas Duran (UIN 01157876) CYSE 200T (CRN 16378) November 1, 2024 Background United States infrastructure has been in a rise of cyberattacks in recent years. A lot of the recent attacks take advantage of legacy systems used on Operational Technologies (OT) which have operated off the network for many years until the recent introduction…
Writing Assignment 1
Joemar Zayas Duran (UIN 01157876) CYSE 200T (CRN 16378) September 13, 2024 The CIA triad provides what is needed to maintain information protection as well as server reliability. Confidentiality, Integrity, and Availability are the pillars of the triad as well as the pillars of cybersecurity. To maintain these pillars, authentication and authorization are used to…