Designing The Public Sphere

It is no secret that most of our life is centered around technology. Technology has become so advanced, that it is intelligent, especially in terms of the material world. Businesses, markets, groups and individuals are all far too familiar with this concept. A good example of this advanced technology, for instance, is Google Glass a…

Workplace Deviance

In order to understand how cyber technology creates opportunities for workplace deviance, one must understand what workplace deviance means. Workplace deviance can be described as the deliberate or intentional desire to cause harm to an organization, or in this case, the workplace. One might imagine how easy cyber technology could help play a role in…

Protecting Availability

This discussion post will cover ways that a CISO could protect availability and why its protection is important   What is Availability? Availability is exactly what it sounds like, having the ability to access all available information whenever it is needed. Availability is maintained, only when all information systems are up and running, without fault. Problems…

CIA TRIAD

Name: Randi Bullard Date: 09/02/2021 Details The CIA Triad is a security model that highlights security objectives and serves as a tool or guide to keep sensitive data protected from cyberattacks or unauthorized access. Fruhlinger, J. (2020, February 10). The CIA triad: Definition, components and examples. The main points of focus for the CIA Triad…

The Human Factor in Cybersecurity

Name: Randi Bullard Date: 09/23/2021 Details It is no secret that human behavior impacts security in a major way. Human behavior has proven that we choose to take the easy road, cut corners and make mistakes. (Capone, J. 2018, May 25) So how exactly does human behavior impact cybersecurity and how can you balance the…

SCADA Systems

Name: Randi Bullard Date: 10/13/2021 Details Critical Infrastructure sites are often times vulnerable to cyberattacks not only because the systems that run them are easily accessible and heavily reliant on cyberspace, but also because critical infrastructures are valuable.  SCADA systems are used to monitor and control critical infrastructures such as water, traffic lights, electricity, gas…