The Federal Investigation Bureau’s cyber team is one of the most profound and highly technical investigation teams known in the cybersecurity world. The FBI takes the lead in protecting the United States against any network intrusions and criminals who are looking to attack critical infrastructure. The FBI’s main goal is to develop and enforce laws…
Cyberattacks, Cyber Threats, and Attitudes Towards Cybersecurity Policies
By Emiliano Sanchez Article Review In this article the authors composed an experiment to detail how the influence of differenttypes of cyberattacks have on policies and the people’s attitudes towards those policies. Theauthors seek to answer two main questions. Does increased exposure to cyberattacks call for asociety to address the problem with more intrusive cybersecurity…
Article Review of “Cyberbullying on Social Media”
In the article of “Cyberbullying on Social Media,” the authors aim to develop a streamlined meaning on what the basis of cyberbullying is, discover the personality traits of the offenders and victims, and analyze the impact it has on victims psychologically and emotionally. The method used by the authors was a systematic review approach through…
The Short Arm of Predictive Knowledge
We should approach our policies with an assumption that breaches are going to happen, we can’t plan for zero casualties that’s impossible. This means that our strategies must be developed well and used properly in their respective places. Also monitoring the system and keeping watch for any casualties or breaches into the system. Our priorities…
Workplace Deviance Involving Cyber Technology
Cyber technology has made incredible advancements in the current year of 2024 especially when it comes to trying to run a corporation or business. Cyber technology simplifies everything increasing the efficiency and effectiveness of that business or corporation. However, there is a downside because not always is the best tool used for the right reasons…
Critical Infrastructure Vulnerabilities and SCADA
A Functioning Society Critical infrastructure refers to the systems that are holding up a functional society andkeeping the system running. “There are 16 critical infrastructure sectors whose assets,systems, and networks, whether physical or virtual, are considered so vital to the UnitedStates that their incapacitation or destruction would have a debilitating effect on security,national economic security,…
The 3 Basic Concepts of Data Security and Maintenance
THE IMPORTANCE OF THE CIA TRIADKeeping data safe and up to standard should be the prime mission of anyorganization that handles critical information. There have been three mainconcepts developed overtime since the 70’s for maintaining data. These conceptsare the backbone to preventing data loss, corruption, and data leaks or the misuseof data in the wrong…
The Human Factor
PEOPLE AND TECHNOLOGYThe first stage of response in cybersecurity is always going to be the preparation. Thosewho prepare will have the best outcome. That’s where the human factor comes into play.The cybersecurity technologies are only as good as the humans who need to run, operate,and program the technologies. Spending all of your budget on high…