Analyzing Cybersecurity

There is a saying about the best sort of defense being offense; I would further define this as someone taking steps to protect themselves before any harm can happen. Harm can be physical, emotional, or even to one’s personal assets – such as, but not limited to, sensitive information regarding a person’s identity, finances, or…

Maslow’s Hierarchy of Needs in Relation to Technology

Psychology seeks to examine the human mind and behaviors to better explain and understand what many of us go through daily. While psychology is explicitly for the human mind, it can be applied in a variety of areas and in a variety of methods. One incredibly well-known concept from psychology is Maslow’s Hierarchy of Needs…

Methods in which to Stop Cybervictimization

The role of cybersecurity in daily life has exponentially increased in the last couple of years, the development of technology seeps into life in many more ways than we as humans could have ever estimated – unless that estimation was that all facets of life would be affected. Cybersecurity exists to protect the sensitive information…

Differentiating Human Faces from Deepfake

Cybersecurity can be impacted by the development of technology in numerous ways, but one of the most recent and most terrifying threats is the ability to deepfake images, specifically when it related to human facial imagery being used. In the article, “Testing Human Ability to Detect ‘Deepfake’ Images of Human Faces,” the authors used an…

Factoring Humans and Technology into the Equation

For fields in which technology is heavily relied upon, a question that seems to be asked time and time again is “just how much is a human factor needed?” For businesses, the difficulty with this concept is that the budget needed to sustain employees and keep up to date on software may be more than…

Vulnerabilities of SCADA Systems

There are many critical infrastructure systems that are vital to the smooth running of the nation of the United States of America, but without proper use of SCADA applications, there are many vulnerabilities which can be exploited. Critical infrastructure systems refer to typically government owned public facilities which keep the necessities of a nation afloat….

The Importance and Utility of the CIA Triad

The CIA triad is the basis for the operation of the CIA as well as what makes up the acronym of the CIA’s name, Confidentiality, Integrity and Availability. Through the acronym of CIA, the mission of the CIA is clearly and efficiently stated, to keep accurate and important information away from the eyes of those…