Journal Entry #4

Maslow’s Hierarchy of Needs is relevant to this day. Abraham Maslow’s theory states that the hierarchy of needs that all human have needs that exist on a hierarchy. In today’s society having access to the internet and having a cellular device is pretty normal, but not a psychological need such as food and water. However,…

Journal Entry #3

On the website PrivacyRights.org , multiple different types of breach’s are explained. The different type of breach’s are fraud involving debit or credit cards, hacking, insider, physical, portable device, stationary computer loss, unintended disclosure not involving hacking, or unknown breaches. Researchers can use this information to identify what kind of breach is happening and how…

Journal Entry #2

The principles of science help cybersecurity in many different ways. Science creates and improves products. The market drives cybersecurity. Science also advances knowledge to the growing field of cybersecurity. It also makes sub categories such as “cybersecurity science” which is an important aspect of the understanding, development, and practice of cybersecurity.

Journal Entry #1

The area that I would want to focus my career on would be “Oversee and Govern”. Oversee and Govern workers provide leadership, management, direction, or development and advocacy so the organization may effectively conduct cybersecurity. This area of work appeals me the most. The area that I wouldn’t want to focus my career on would…

SCADA Systems

Critical Infrastructure is very important. With that being said, it always needs to be protected. Critical Infrastructure needs to be protected from it’s vulnerabilities. Some examples of critical infrastructure vulnerabilities are DDos attacks, malware attacks, network segmentation, and Fishing. With that being said, that is why we use Supervisory Control and Data Acquisition (SCADA) which…

Benefiting from NIST Framework

Every organization in America would benefit from the NIST Cybersecurity Framework. As said in one of the articles “The United States depends on the reliable functioning of its critical infrastructure.” With the rise of hacks, ransomware, spyware, viruses, and worms, strengthening their technological systems would help. In the past three months I know of two…

The CIA Triad

The Confidentiality, Integrity, Availability(CIA) Triad according to Josh Fruhlinger, a University of California alumni, is a widely used information security model that can guide an organization’s effort and policies aimed at keeping it’s data secure. The confidential aspect is made up by only allowing authorized users to access data models. The integrity aspect is made…