The Impact of Human Behavior Write Up
How I would balance the tradeoff of training and additional technology is not spending as much money on training. The reason why is because there is a greater risk if humans were in charge of security. Instead, I would spend the money on a technology solution. For example, instead of manually putting data in, a computer would put in the data itself. Another way this could be helpful is a computer can detect if someone trying to steal flies. Like if flies were being downloaded at ten flies per minute that could possibly be a hacker. So, the computer would send a virus to stop them from stealing the flies. Another reason why I would spend more money on additional technology instead of training is because some breaches can be intentional. This means that the breaches could be caused internally by the employees. Companies would like to hope that their employees would not do that, but that is not the case. The sad truth is that we live in a world where it is hard to trust people because you do not know what their intentions are. That is why it would be good for companies to use computers to put sensitive data in because you know that the computers will not betray you. It is also I good idea to have data protected at all times and start it at the source. The reason why is because it is hard to keep up with data if you do not start it at where it was created because too many things can happen. When an employee shares the information it is hard to keep it protected because there is just too much data to keep up with. That is why it is important to keep data protected at all times and start it with where it was created.
CIA Triad Write Up
The CIA triad is a model organizations use for security to keep their data secure. What CIA stands for is Confidentiality, Integrity, and Availability. Unlike other foundations, the CIA triad does not have one single creator. It is an article that has developed over time and since it does not have one creator people like to write their own interpretations about it.
The “C” in CIA stands for confidentiality. People all over the world need to protect their sensitive and private information. With confidentiality that is made possible. The reason why is because confidentiality is where only people with authorization can access or modify data.
Next is integrity. This part of the CIA triad protects the data from deletion and modifications from anyone who does not have authorization for it. Even if someone does succeed in changing anything with integrity it is possible to reverse it.
Last is Availability. Availability is the simplest out of the three. The reason why is because it means that authorized users can access the data whenever they want.
Authorization is a determination of the level of access someone holds to certain information while authentication is a form of self-identification. Authentication derives from a root word of authentic which means the undisputed origin. Therefore authentication is determining whether someone claiming to be the undisputed person of origin is truly what they claim. Authorization on the other hand derives from authorizing which is to allow and authorization is allowing someone to access certain levels of information based on their authentication.
Opportunities for Workplace Deviance Discussion Board
It created opportunities for workplace deviance by making it easier to take place. Committing a cybercrime is becoming easier to do as technology advances. There is a lot of places that are vulnerable to a cybercrime. Some examples are healthcare and education. Hacking is most likely to happen in places that have a lot of private information. That is the reason why the healthcare and education sectors are most likely to get hacked.