Designing a Security Policy

Miles Anderson Old Dominion University CYSE 300: Introduction to Cybersecurity Dr. Joseph Kovacic January 28, 2024 In regards to designing a security policy, there are many steps that need to be taken to ensure the policy is strong, has little vulnerabilities, and methods to counteract a cyber attack. Security policies made to protect data servers…

Ukraine Power Grid Attack

Miles Anderson Old Dominion University CYSE 300: Introduction to Cybersecurity Dr. Joseph Kovacic January 21, 2024 Ukraine power companies experienced multiple blackouts on December 23rd, 2015 that affected a large number of people throughout the country (“Cyber-Attack”, 2021). Although many may have thought this was a typical power outage, it was the work of a…

The Human Factor Write-Up

Miles Anderson November 29, 2023 Managing Limited Funds – Balance and Security In order to achieve a balance between security and properly trained employees in a workplace environment, careful consideration must be given to how to allocate funds. Intentional or unintentional, employees can be a huge risk to their own organization and can potentially become…

CYSE 200T Analytical Paper

Miles Anderson December 10, 2023 Why I Think Cyber Security Isn’t Enough As of 2023, technology has come an extremely long way and continues to become more and more advanced. While it’s hard to imagine what technology will be capable of in ten years, it’s also scary to think about what new cyber threats will…

Port of Antwerp Case Study – Cyber-Physical Breaches

Cyber-physical threats refer to an attack that uses a combination of cyber technology and physical action to impede the options of a physical space. Between the years 2011-2013, one of the earliest cases of a cyber-physical breach occurred at the Port of Antwerp. Through organized plotting, illegal activities, and hacking devices, the scheme on the…

SCADA Systems – Mitigating Risks

SCADA Systems – Mitigating Risks Cybersecurity professionals have an important role in protecting critical infrastructure from both cyber and physical threats. SCADA Systems have been used in the cyber world in order to protect critical infrastructure from vulnerabilities. With the ability to communicate with vital systems, provide troubleshooting tactics and real-time data, and reduce downtime…

The CIA Triad: Guide Towards Security

The CIA Triad is used as a basis for creating policies that ensure the information of any particular organization or business entity is secured. Using the three fundamental elements of cybersecurity, which are confidentiality, integrity, and availability, the CIA Triad has become the staple of information security. The CIA triad, as well as the concepts…