April 2, 2023 Deviance is known as behavior that is not usual to the norms of society which leads to negative social reactions. Workplace deviance is described as deviance that takes place in the workplace. Cyber technology allows for more opportunities for workplace deviance because of technology and the internet. Cyber technology also allows for…
Author: nedwa004
Analytical Paper
Nathan Edwards CYSE 200T Professor Aldabagh Analytical Paper: April 17th 2023 Analytical Paper Having a limited budget as chief information security officer, I would have to balance a tradeoff of training and additional cybersecurity technology to ensure safety and help prevent cyber-attacks. Finding a balance between training and additional cybersecurity technology is very important because…
CIA Triad
Nathan Edwards CYSE 200T Professor Aldabagh CIA Triad; Feb 5th The CIA Triad is defined as a model that guides policies for information security within an organization (Chai, 2022). The CIA Triad consist of three main parts which are confidentiality, integrity, and availability. Confidentiality in the CIA Triad is defined as privacy. Confidentiality help prevent…
SCADA Systems
Nathan Edwards Professor Aldabagh CYSE 200TSCADA Write-Up: 3/26/23 Critical infrastructure systems, such as, pipelines, irrigation systems, pump stations, sewage distribution, transportation systems, etc, face many vulnerabilities to cybercrime. For example, one vulnerability that these infrastructure systems face is weak security systems. These systems may have weak physical protection, all information on one port, devices that…