Hacking Scenes in Movies Compared to Reality

            Hacker Rates 12 Hacking Scenes in Movies and TV, a video that is part of Insider’s How Real Is It? series on their YouTube channel, details different hacking scenes from various TV series and movies and then having an actual professional in the cybersecurity field critique how realistic the scenes are. After viewing the…

Fake vs. Real Websites

One of the most common methods of gathering personal, sensitive information from the average user is the creation of fake websites. Websites that appear to be from package delivery services, such as FedEx or UPS, are an example. These scam attempts are often done through text messaging or emails, that state that there is an…

Important Issues to Be Addressed in System Security Policies

            There are many factors that go into the creation and implementation of corporate information system security policies. These policies will ensure the security and confidentiality of sensitive information present within the system. Due to this, these policies must be carefully created by considering the different areas of a system’s security that could potentially hold…

The Equifax 2017 Data Breach: Vulnerabilities, Repercussions, and Potential Mitigations

            Equifax is one of largest consumer reporting agencies (CRAs), currently supporting 87 million consumers with credit card related services only. On September 7th, 2017, Equifax announced that a data breach incident had occurred. This breach affected 143 million consumers based in the U.S. alone, which after further investigation, rose to 148 million, making it…

SCADA Systems and Mitigating Vulnerabilities

(Originally written on November 2nd, 2024) Introduction to SCACA Systems: SCADA, which stands for Supervisory Control and Data Acquisition, refers to the systems used to control critical infrastructure processes. These systems allow control and the overall gathering of data from the industrial equipment to be done remotely rather than on site. SCADA constantly monitors the…

Protecting Availability as CISO

“If you were the CISO for a publicly traded company, what are some protections you would implement to ensure availability of your systems?” One of the main actions I would take for protecting the availability of the company’s systems would be ensuring that there are regular backups of the data present in the system. This…

CIA Triad Write-Up

(Originally written on September 15th, 2024) General Overview:             The CIA Triad is defined as “a model designed to guide policies for information security within an organization.” (Chai 2022). This model is composed of three parts : Confidentiality, integrity, and availability. All of these parts provide a solid foundation for an organization’s policies and are…

Maslow’s Hierarchy of Needs and Cybersecurity

Maslow’s Hierarchy of Needs is a theory used in the psychology field that states that human motivation to fulfill their needs is done in a hierarchical way. This theory provides five different levels of these needs, starting with basic needs like food and water and then continues to become more advanced until reaching the top…

Benefits of the Study of Data Breaches

The website PrivacyRights.org provides multiple diverse and publicly available articles that center around privacy laws and data protection. These articles can be of great use to researchers who want to understand more about data breaches and those developing privacy or security policies. By studying these breaches, researchers can assess the frequency of these breaches, along…

Application of the Principles of Science

In cybersecurity, the principles of science can be applied in multiple ways. The principle of parsimony centers around simplicity. When developing and testing methods of preventing malicious attacks in the cyber world, it is important to keep the principle of ethical neutrality in mind. The ways that these new preventative technologies should not negatively affect…