Mitigating Ransomware Risks in Manufacturing and theSupply Chain: A Comprehensive Security FrameworkAljoghaiman, A., & Sundram, P. K., Veera. (2023). Mitigating Ransomware Risks inManufacturing and the Supply Chain: A Comprehensive Security Framework.International Journal of Cyber Criminology, 17(2).https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/214/81This article is important because it shows the cause and effect of what happens when employeeslearn about how to migrate…
Module 5 Journal
The NICE framework is used by employers to develop their cybersecurity policy. I think that themost important category of the NICE framework is protection and defense. I think that this is thefirst line of defense for the network of the company. Making sure that the bad stuff does not getin the network makes it easier…
Module 4
Maslows Hierarchy of Needs starts with physiological needs, safety and security, loveand belonging, self-esteem, and self-actualization. The first level being physiological needssuch a food, clothing, water. While technology may not be on the list now as the world evolves itbecome harder and harder for people to function with out technology. I use my phone to…
Module 2 Journal Entry
Relativism – meaning that all things are related. In cyber security that would mean that they may not deal with cybersecurity and actually use it as a building block. And I’m doing so shows that all things are actually related. This is related to cybersecurity because as technology advances , cyber threats also advance and…
Module 1 Journal Entry
The three top categories in the NICE framework are protect and defend , operate and maintain, and securely provision. The meaning of protect and defend is where a lot of cyber objectives come into play. It’s where information is gathered and then used to actually put into place rules and deterrents so that the system…
How to Budget CyberSecurity
BLUF The scenario that was given is that we are the CISO of a company and we must budget for training and the technology for cyber security. The first thoughts that popped into my head were: what type of training would we do, how often would we do the training, what type of technology is…
Protecting Availability
The precautions that I would take as the CISO is to make sure that everyone has training every 6 months. The training would be advanced and not just something that one person could click through. I would do in person training as well make them do an activity so that I know they are following…
Critical Infrastructure Needs Supervisory Control and Data Acquisition
BLUF Critical infrastructure are systems and networks that provide functions that are needed and used in everyday life. To be able to monitor the infrastructure as well as analyze the pattern of the systems we have to use an automated tracking system which is where the SCADA system comes in. SCADA means supervisory control and…
CIA Triad
The CIA triad represents the fundamentals of cybersecurity, one element would not be able to exist without the other. The “C” in the triad means confidentiality, it’s the rules and regulations that limit the access to sensitive information. The “I” means integrity; it’s the assurance that the information is accurate. The “A” means availability, it’s…