The Colonial Pipeline ransomware attack of May 2021 is a significant cybersecurity incident that focuses on the vulnerabilities ingrained in critical infrastructure systems. This attack disrupted fuel supplies across the eastern United States, highlighting the importance of sturdy cybersecurity measures for critical infrastructure. This paper examines the vulnerabilities exploited in […]
Yearly Archives: 2024
Securing corporate information systems such as web, application, and database servers is critical for protecting sensitive data and maintaining overall system integrity. An efficient security policy should ensure data protection, prevent unauthorized access, and handle security breaches efficiently. There are essential elements of such a policy including data encryption, incident […]
Chapter two talks about criminal law, which protects civilians by maintaining order and punishing harmful actions. Understanding key concepts in criminal law helps us see how it keeps society safe.Common law is based on past court rulings, while criminal law follows written statutes. For example, in Roe v. Wade (1973), […]
Pennsylvania State University. (2022, March 2). Social media affects on the criminal justice system. Applied Social Psychology: PSYCH 424 Blog. https://sites.psu.edu/aspsy/2022/03/02/social-media-affects-on-the-criminal-justice-system/ This blog explains how social media influences the criminal justice system by shaping public opinion and sometimes even legal decisions. It highlights how viral posts can create bias, leading […]
Chapter six “Modern Policing” (Fichtelberg, 2021) focuses on many aspects including the fourth amendment. Police are supposed to follow procedures when executing a search and seizure, but unfortunately a lot of the time, that does not happen. There have been many cases where police force their way into someone’s home, […]
The CIA Triad, Confidentiality, Integrity, and Availability is a fundamental cybersecurity model that guides different organizations in securing sensitive information and data. Understanding the differences between authentication and authorization, which control access and permissions, is crucial to safeguarding data and ensuring a secure system.IntroductionThe CIA Triad is a core principle […]
In this memo, we will talk about the best placement for the Cybersecurity department, which would be the IT department. The IT department Pros The best and most efficient place to integrate the Cybersecurity department would be within the IT operations. This is because they would provide many important skills […]