The specific areas I wanted to focus my career on are related to Implementation and Operations (IO) and Investigations (IN). Out of these two, the Investigations section is the most interesting to me, specifically the digital evidence analysis aspect. As the name suggests, this section focuses more on the collected evidence found during investigations and…
Opportunities for Workplace Deviance
Jones, John W. “Employee Cybercrime and Deviance: A Loss Prevention Psychology Perspective.” Loss Prevention Media, 1 Oct. 2023, losspreventionmedia.com/employee-cybercrime-and-deviance-a-loss-prevention-psychology-perspective/. Accessed 19 Oct. 2025.
Balancing the Tradeoff of Training and Additional Technology
Michelle SmithC. KirkpatrickCybersecurity 27 October 2025 Balancing the Tradeoff of Training and Additional Technology I believe that cybersecurity training should be prioritized over additional technology. Although having the necessary technology is important, knowing how to defend against attacks is more beneficial to both the workplace and the individual.Training Budget If I were the Chief Information…
SCADA Systems
Supervisory control and data acquisition, or SCADA, is a system that monitors and protects critical infrastructure processes against internal and external threats. The biggest threats against the SCADA system are unauthorized access and unsecure packets.Introduction SCADA’s main purpose is to monitor and control critical infrastructure processes. This system is only used in processes that require…
Authentication vs Authorization
Michelle SmithC. KirkpatrickCybersecurity 14 September 2025CIA Triad: Authentication vs Authorization Authentication and authorization deal with security and data protection, but they have different functions within the security process. While authentication verifies a user, authorization grants access to the user.Introduction In cybersecurity, protection is guaranteed through a series of methods, two common methods being authentication and…