NICE Framework

            When looking at the NICE Framework, I find myself gravitating towards several specialty areas. Digital forensics jumps out at me, as I find the idea of collecting and analyzing computer-based evidence of crimes fascinating. More realistically, I think I would like to work in cyber defense analysis or vulnerability assessment and management, as working…

Cyber Technologies and Workplace Deviance

            Cyber technologies have brought irreparable changes to the workplace, and with that have created new avenues for counterproductive work behavior. The most significant and contentious of which is cyberloafing, or the personal use of the internet during work hours. While employers may view this as a productivity loss, research such as a 2008 study…

The CIA Triad, Authentication, and Authorization

            Confidentiality, Integrity, and Availability, known collectively as the CIA triad, are the three most fundamental concepts in cybersecurity. Confidentiality is restricting data to only those who are authorized to access it, Integrity is the completeness and accuracy of data, and the inability for it to be illegitimately altered, and Availability is the ability for…

SCADA Vulnerabilities and Solutions

            SCADA, or supervisory control and data acquisition, systems are networks of software and hardware for the purpose of remotely controlling and monitoring industrial processes (“What is SCADA,” 2018). According to Fabio Terezinho (n.d.), some benefits SCADA provides to critical infrastructure include the elimination of human error in data collection, increased reliability through automation, swift…