When reviewing the NICE Workforce Framework I would like to focus on specifically Investigating, overseeing and governing, and protecting and defending. I would appeal less to analyzing, operating and maintaining, collecting and operating, and Securely Provision. I would like to focus on investigating as it applies to becoming a cyber investigator and a digital forensics…
Author: jbene008
How can researchers utilize publicly available information on data breaches from PrivacyRights.org for their breach studies?
When visiting the website PrivacyRights.org I instantly noticed how researches use this information to study and become informed about breaches. When opening the page it came up with information regarding the law overviews, reports, and advocacy. After going into depth in the Advocacy tab there were a variety of articles that can inform researchers from…
How the principles of science relate to cybersecurity
Science and Cybersecurity have a deep coherent bold that interlinks the two in a variety of ways. Science is the observation and identification of a theoretical explanation. Cybersecurity relates to science as one of the major aspects of defending a system and observing that system against threats. I would describe cybersecurity as a defense against…
The Human Factor in Cybersecurity
BLUF: The primary responsibility of a CISO is to ensure that an organization will maintain information security and integrity, ensure that it is not vulnerable, and implement safety measures to keep it secure. If I had the Job as CISO I would ensure my resources would be spent towards employee training, risk management, and applicable…
The CIA triad and authentication vs authorization
BLUFThe CIA triad (which stands for confidentiality, integrity, and availability) is a system that is crucial to organizations to stay secure within their network online. Authentication is regularly referred to as the process of proving who you say you are (Werner). While Authorization is an act of proving who you say you are. (Werner) Introduction…
SCADA Systems
BLUF: Scada system stands for supervisory control and data acquisition and is generally used for critical infrastructure. These systems must be safe as they can be used for water treatment facilities and airports and ships. The major issue with SCADA systems is that they weren’t made to be safe from a cybersecurity perspective therefore commonly…