The Essential Role of Social Science in Cybersecurity Analyst Careers

Connecting Human Factors with Modern Cybersecurity Practice Introduction Cybersecurity has become an indispensable facet of the digital age, shaping how individuals, organizations, and societies safeguard their assets and information. While technical proficiency remains a cornerstone of effective cybersecurity practice, the significance of human behavior, social structures, and ethical considerations is becoming increasingly apparent (Bada, Sasse,…

Cybercrime Victimization in Umuahia North: A Social Science Perspective

Cybercrime is a growing global concern, especially in developing regions where digital literacy and access to cybersecurity resources are limited. The article “A Study of Pattern of Cybercrime Abuse of Individual Internet Users in Umuahia North LGA, Abia State of South-eastern Nigeria” by Nzeakor, Okafor, and Nwoke investigates how internet users in this Nigerian locality…

Controlling Cyber Crime through Information Security Compliance Behavior

In an increasingly digital world, organizations face the ongoing challenge of safeguarding sensitive information from cyber threats. The article “Controlling Cyber Crime through Information Security Compliance Behavior: Role of Cybersecurity Awareness, Organizational Culture and Trust in Management” by Mohanad Ghaleb and Jamshid Pardaev provides an insightful exploration into the behavioral aspects that underpin cybersecurity compliance….

Attacks on Availability

An attack on availability is a security breach that its sole purpose is to reduce reliability, accessibility, or the performance of data. The different types of attacks on availability includes Denial of Service (DoS), malware, ransomware. DoS floods a network or system making it hard to access by legitimate users. When this happens, it causes…

SCADA Systems

Any type of security–based systems is subjective to being targeted. SCADA is noexception. SCADA is supervisory control and data acquisition. According to the SCADASystems article, it “refers to ICS (Industrial control systems) used to control infrastructureprocesses, facility–based processes, or industrial processes”. SCADA systems allow usersto make informative decisions to make sure the infrastructure and operations…

The CIA Triad

The CIA triad, which is also known as confidentiality, integrity, and availability, isconsidered one of the most integral concepts in cyber security. It helps guide policies forinformation security in organizations. It’s essentially a way to keep important informationsafe. Authentication and authorization are very important to the CIA Triad. Authenticationallows systems to verify a user is…