Explain how the principles of science relate to cybersecurity -In cybersecurity, principles of science apply as the field of cybersecurity encompasses many different topics of study. As computer science is intrinsically interconnected with cybersecurity so are the social sciences of psychology, sociology, and criminology. The study of cybersecurity must take on the scientific principles of relativism, objectivity, parsimony, empiricism, ethical… Read more →
CYSE 201S Journal Entry: 1
Review the NICE Workforce Framework. Are there certain areas thatyou would want to focus your career on? Explain which areas wouldappeal the most to you and which would appeal the least. -In the field of cybersecurity, they’re many different roles and jobs that incorporate the workforce. The areas from the NICE Framework that appeal most to me are the categories… Read more →
Approaches for the Development of Cyber-Policy and Predictive Knowledge.
In our modern world, we find ourselves ever emerging the physical world with the digital. As societies become more and digitalized, there needs to be a sense of security and trust within the scope of the digital whelm. Security of novel technology seems to be an afterthought, as we have seen in the past, as newer technology becomes ever more… Read more →
The Overlap Between Criminal Justice and Cybercrime
Cyber technology has impacted the world with different ways to communicate, study, work, and interact with one another. Never before has it been easier to keep in contact with anyone, even from across the globe. As cyber technologies have brought much connection and have created countless communities, the medium has also given bad actors new opportunities unlike ever before. Cyber… Read more →
Supervisory Control and Data Acquisition (SCADA)
Supervisory Control and Data Acquisition (SCADA), is a structure that refers to the central control over a system that monitors complex systems that are spread out in a large facility. Almost all controls are automatic and are performed by remote terminal units (RTU) and by programmable logic controllers (PLCs). These data acquisitions can be adjusted or overridden by the human-machine… Read more →
Computers: Do They Make the World Safer or Less Safe?
Computers have revolutionized every aspect of human life. A task that took much attention, as well as time, is now being done a lot quicker by algorisms. One could make a solid case that no other invention has drastically changed the world such as the creation of computers. Ripple effects have been felt by the changes in productivity, efficiency, and… Read more →
Signs to know when your Computer might be Compromised
Almost everyone in the modern world daily has access to a computer. When accessing a computer, a user might assume that the systems are safe and secure. However, one must never assume that any device is 100% safe. For a user to be productive and have peace of mind they are recommended to do the following: The user can tell… Read more →
Investing in Cybersecurity for your Business
In the past decade, businesses have realized the essential need to develop and implement strong cybersecurity measures. With cyber-attacks on the rise, organizations are taking action to prevent the distress of losing financial assets and ultimately the fear of losing any business. There are many costs when it comes to developing a cybersecurity program for a company. For instance, there… Read more →
Workplace Cyber-Deviance
Cyber-deviance in the workplace can be defined by any behavior that goes against the company’s norms. It ranges in degrees of severity and also who has been impacted. Deviance in the workplace has been a prevalent issue. It was not created by new technologies; however, technologies have exacerbated deviant behavior at work. Cyber technologies like the internet have opened the… Read more →
Using the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity
Create cybersecurity startup. YouTube educational videos on Security+. Build a VPN application for the app store. Educate listeners on a cybersecurity podcast. Regulate security auditing. Sell cybersecurity products. Engineer penetration testing contracted by a company. Create blog post about cybersecurity news. Utilize the stock market by buying cybersecurity stocks. Raise awareness by writing a book on cyber weapons. Independent cybersecurity… Read more →