For this journal entry I will be talking about how scientific principles relate to cybersecurity. I chose to do my post on relativism, objectivity, and determinism. Relativism suggests that truth and morality are subjective and may vary based on individual perspectives or cultural contexts. In cybersecurity, relativism might be reflected in the diversity of ethical…
Author: nharp004
Maslow’s Hierarchy of Needs
Maslow’s Hierarchy of Needs is a psychological theory that categorizes human needs into a hierarchy, with basic physiological needs at the bottom and higher-order psychological needs at the top. Physiological need are the basic survival needs, such as food, water, and shelter. When it comes to the digital connection, access to technology has became one…
Data Breaches
How might researchers use privacyrights.org to study breaches? Privacyrights.org is a great database to use when studying data breaches. It has data dating back to 2005. You could use analyze this data to identify any anomalies or patterns. Since the database has its data split up by year you could use this information to identify…
The CIA Triad: The Basis for the Development of Security Systems
The CIA Triad serves as a framework for information security, helps businesses and companies keep their data safe from criminals and threats, ensures compliance with regulations and policies, and helps maintain trust with their customers. What is the CIA Triad? The CIA triad stands for Confidentiality, Integrity, and Availability. Confidentiality measures are designed to…
SCADA Systems and Their Role in Mitigating Vulnerabilities in Critical
SCADA systems are important in keeping our critical infrastructure safe from vulnerabilities. These might include cyber threats, legacy systems, and human errors. SCADA systems offer real-time monitoring, access controls, and segmentation to provide enhanced security. It is important that we work together to protect vital infrastructure in our interconnected world. What is SCADA? Supervisory…
Cybersecurity Budget Allocation
Allocating cybersecurity budget is a complex task for the Chief Information Security Officer. CISO’s should consider these five main categories when trying to allocate your funds: Compliance, Ongoing Risk Assessments, Ongoing Security Training, New Business Initiatives, and Business Priority Shifts. The effectiveness of budget allocation significantly impacts the organization’s overall cybersecurity resilience and risk mitigation….
NICE Workforce Framework Journal Entry
For me I think that I would lean toward the OPERATE and MAINTAIN category because I tend to like the technical side of the industry. Within that category I would probably enjoy the Systems Administrator. I think that I would enjoy this area because you are up close and personal to the software and hardware….