Write-up SCADA Systems

The vulnerabilities associated with critical infrastructure systems are characterized as a breach or malfunction in any systems, installations, or assets in any facility-based, or industrial-based processes. This could cause any infrastructure to be incapacitated or lose its ability to perform its required function as a result of being damaged by either a natural disaster, human-caused…

How has cyber – technology created workplace deviance?

In order to figure out how cyber technology created opportunities for workplace deviance you must first define deviance in the workplace. Workplace deviance is defined as a deliberate malicious intent to sabotage organizations by causing problems within the organization itself. Workplace deviance could stem from many things such as intentionally working slowly and coming in…

Protecting Availability as CISO

As a chief information security officer, it would be my duty to protect my organization’s data from cyber threats/ or unauthorized access. In order to protect my organization, there are certain measures I would take. First, I will have programs in place whose purpose is to track and monitor threats in order to eliminate prevent…