Workplace Deviance & Technological Advances

Has the advancements of technology increased the amount of deviance in a workplace? To answer this question, one must first know the definition of what deviance in a workplace actually is and consists of. “Workplace deviance refers to the deliberate, malicious intent to sabotage an organization by causing problems in a workplace.” (What is workplace…

The Protection of Availability

If I were the CISO of a company and had to decide on what to use for protections, I would use the Defense in Depth model (also known as the cross layer model). My reasoning behind this is simply because it’s the easiest, most cost effective method to protecting availability, as well as ensuring the…

SCADA Systems

Industrial control system and supervisory control and data acquisition (SCADA) go hand in hand in the regulation of critical infrastructure systems such as water treatment, wastewater treatment, and windfarms. The purpose of SCADA is to “maintain efficiency, process data for smarter decisions, and communicate system issues to help mitigate downtime.” For instance, if there is…

The CIA Triad

The CIA Triad is the basic structure for setting up security for information. This model allows for any organization to determine how to safely “handle data when it is stored, transmitted, or processed” (EI-ISAC). It also acts as a way to put a name to what kind of attack is being made on the system…