The Vulnerabilities of Critical Infrastructure Systems & SCADA

S.C.A.D.A. System Control and Data Acquisition or “SCADA” describes systems that are used to monitor and better facilitate equipment, particularly in industrial operations. The ability of SCADA to communicate data has improved with every iteration of networking technology (2026). Having evolved from Monolithic to Networked, SCADA has many practical uses, with its systems often being…

Methods to Allocate Limited Funds for Cybersecurity Purposes

Security Awareness Training Regularly training employees and increasing their awareness of risks such as phishing and MITM attacks would strengthen security by sharpening their response. This is why another way to make the most out of limited funds while also protecting resources from cyber criminals is by introducing security awareness training. Employees and end users…

Opportunities for Workplace Deviance

Cyber technology often gives employees discreet and easier ways to commit workplace deviance due to the remote access it provides. Technology is integral in the average workplace, with many fields requiring employees to operate computers occasionally, if not all the time in occupations such as office jobs. This can make it easy for employees to…

Where does IT fit in a business?

I believe IT fits best in operations. A great deal of IT revolves around maintaining computer problems, improving productivity by troubleshooting, and ensuring systems are able to run smoothly. The individuals in Information Technology are usually the first contact for those experiencing problems with their devices while also being a large part of maintenance and…

Mutune Article Key Takeaways

The key take away I had from the mutune article was the major viruses in cybersecurity history that also led to the advancements of computer safety.It shares that in the youth of the internet and computers (1970-1980s), threats were easy to detect and had not yet advanced to the level which they are at today….

The Backbones of Computer Security: Confidentiality, Integrity, and Availability & Authentication and Authorization

Confidentiality Confidentiality’s role in the CIA triad involves protecting sensitive data from unauthorized lookers, only allowing it to be accessed by specific parties or a specific individual. To ensure confidentiality one could use strong encryption methods like AES or RSA to protect data from unauthorized reading, even if intercepted (GeeksforGeeks, 2018). In a world of…