I was asked to think deeper into how modern technology could truly negatively impact our future. This article was what my findings would be based upon and what my interpretations and opinions would be based off of. I believe that this article really puts into perspective the mindset that we don’t really think about. It’s…
Author: mbear002
SCADAs Security Methods
The SCADA systems play a huge role in the protection of basic needs for everyone. These systems, I don’t think, should have any flaws in their security systems due to the importance of the resources involved. The US system back in 2010 was hacked, and that led to Homeland Security needing to step up the…
Budgeting Allocations
As the Chief Information Security Officer, the budget would be allocated mostly to training. I believe that the way my people preserve the integrity of the cyber systems in place is huge. (The Viking Cloud Team, 2025) found that 88% of cyber attacks are due to human error. I find that the reliability of those…
The Illustrations of the CIA Triad and Authentication vs. Authorization
In this write-up, I first describe the CIA triad and how all three functioning parts work together best to help a security system run smoothly while being properly protected by ensuring who needs to have access does, the systems have safe and reliable forms of backup protection in case errors or attacks on the system…