With the rapid discovery of new technological devices and advances out there, it can be hard for us as consumers and human beings to keep up with. Markets, businesses, and groups are definitely having difficulty with this as something new is being discovered everyday. They need to be able to adapt to these changes in…
The “short arm” of predictive knowledge
From this week’s Jonas Reading, technology in itself is predictable and can be unreliable at times. To clarify, at any time our computers can shut down and we can lose files, data, etc. if they are not backed on a hard drive or cloud. Also, with the use of technology, there can be many pros…
The CIA Triad
The purpose and primary goal of the CIA Triad is to protect the data of different organizations. It is a “information security model” that is used by many organizations to keep their information secure. When it comes to the creation of the CIA Triad, there is no record of just one creator of the model….
SCADA Systems
Critical infrastructure systems are important and necessary aspects which keep our economy functioning efficiently. Some of these are our water supply, gas pipelines, highways, railroads, etc. However, these critical infrastructure systems can become vulnerable to attacks, specifically cyber-related. One example of a threat to critical infrastructure is the Colonial Pipeline attack. It happened back in…
NIST Cybersecurity Framework
Having some form of security in the workplace is vital, especially with the aging of technology. The effects of not having any form of cybersecurity can be detrimental to a company. For instance, “it can harm an organization’s ability to innovate and to gain and maintain customers” (NIST Improving Cybersecurity). However, organizations can gain many…
The Human Factor in Cybersecurity
Realizing that I have a limited budget, I would balance the tradeoff of training and additional technology by securing all data to only allow authorized people to access the data. As a result, this would protect “enterprises from both internal and external threats without altering the way users collaborate, share, and use files” (Capone, 2018)….