Annotated Bibliography

Mitigating Ransomware Risks in Manufacturing and theSupply Chain: A Comprehensive Security FrameworkAljoghaiman, A., & Sundram, P. K., Veera. (2023). Mitigating Ransomware Risks inManufacturing and the Supply Chain: A Comprehensive Security Framework.International Journal of Cyber Criminology, 17(2).https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/214/81This article is important because it shows the cause and effect of what happens when employeeslearn about how to migrate…

Module 5 Journal

The NICE framework is used by employers to develop their cybersecurity policy. I think that themost important category of the NICE framework is protection and defense. I think that this is thefirst line of defense for the network of the company. Making sure that the bad stuff does not getin the network makes it easier…

Module 4

Maslows Hierarchy of Needs starts with physiological needs, safety and security, loveand belonging, self-esteem, and self-actualization. The first level being physiological needssuch a food, clothing, water. While technology may not be on the list now as the world evolves itbecome harder and harder for people to function with out technology. I use my phone to…

Module 3

On the website it gives many statistics on the type of breaches that are in the database and how many users are affected and the type of breach that is being had. Researchers would use this information to see which type of breach is in use the most and if there is a certain area…

Module 2 Journal Entry

Relativism – meaning that all things are related. In cyber security that would mean that they may not deal with cybersecurity and actually use it as a building block. And I’m doing so shows that all things are actually related. This is related to cybersecurity because as technology advances , cyber threats also advance and…

Module 1 Journal Entry

The three top categories in the NICE framework are protect and defend , operate and maintain, and securely provision. The meaning of protect and defend is where a lot of cyber objectives come into play. It’s where information is gathered and then used to actually put into place rules and deterrents so that the system…

How to Budget CyberSecurity

BLUF The scenario that was given is that we are the CISO of a company and we must budget for training and the technology for cyber security. The first thoughts that popped into my head were: what type of training would we do, how often would we do the training, what type of technology is…

Protecting Availability

The precautions that I would take as the CISO is to make sure that everyone has training every 6 months. The training would be advanced and not just something that one person could click through. I would do in person training as well make them do an activity so that I know they are following…

Critical Infrastructure Needs Supervisory Control and Data Acquisition

BLUF Critical infrastructure are systems and networks that provide functions that are needed and used in everyday life. To be able to monitor the infrastructure as well as analyze the pattern of the systems we have to use an automated tracking system which is where the SCADA system comes in. SCADA means supervisory control and…

CIA Triad

The CIA triad represents the fundamentals of cybersecurity, one element would not be able to exist without the other. The “C” in the triad means confidentiality, it’s the rules and regulations that limit the access to sensitive information. The “I” means integrity; it’s the assurance that the information is accurate. The “A” means availability, it’s…