Human Behavior versus Technology Access

Human error plays a major role in cyber security breaches. Whether it is a disgruntled employee, an uneducated worker, or a mishap that occurs via human error, the human and psychological aspects of cyber security are paramount. In the blog entitled “Why is Cyber Security About Human Behavior”, there are 9 areas identified in their…

Cybercrime and Solutions

Cybercrime has become a well-known term globally, yet this fairly new area of criminology that has created a gap between our legal system and our criminal justice system. Cybercrime has become one of the most pervasive crimes taking place across the world however experts struggle to understand it and more importantly are failing to combat…

The Short-arm of Predictive Knowledge

The nature of cyber security is evolving swiftly. The cyber world’s short arm of predictability does not lend to long-term planning and development of future policies and systems that we can rest on. The use of methodologies such as those set forth in the NIST provide a comprehensive approach to developing a cyber policy and…

Designing the Public Sphere of Technology

Schwab (2016) states that we are on the brink of the fourth industrial revolution known as the digital revolution. The author goes on to describe this revolution as building on the technological revolution yet states this digital revolution will be like nothing we have experienced before. The speed of digital development and the expansion of…

Workplace Deviance

Technology has created ample opportunities for employees to participate in workplace deviance. From sabotage, fraud, vandalism, or simply accessing inappropriate websites at work, workplace deviance is one primary source of data breaches within the workplace. In this week’s readings, (Collins et al, 2011), state the percentage of data breaches from insiders ranged from 29%-48% of…

Intrusion Detection Systems

Intrusion Detection Systems Stephen Rockefeller Cyber Security CYSE 250 Old Dominion University Abstract The ability to detect unwanted intrusion in real time is critical in protecting a system or network from malicious attacks. Intrusion detection systems are essential to providing users a safety net in which they can protect their business or personal data from…

SCADA

SCADA Name: Stephen E. Rockefeller Date: 3/20/2022 Details: Critical infrastructure systems include airports, water treatment systems, bridges and tunnels, nuclear plants, highways, and many other systems that are critical to society’s normal daily life and national security. Any interruption to one of these systems can endanger the lives of thousands of individuals or put national security…

CIA TRIAD

The CIA Triad Name: Stephen E. Rockefeller Date: 3/14/2022 Details: In the world of information security, CIA stands for confidentiality, integrity, and availability. These 3 letters are well known within the cyber security and information security community as the CIA Triad. According to Walkowski (2019), the CIA Triad is the cornerstone of any organization’s cyber security…

Biological Sciences and Cyber Security

The biological sciences, like many other fields, have been increasingly digitized. With the ease and efficiency of digitization comes the cyber-security issues facing many other industries. Bio-cyber security is a new field but a fast growing one. In the reading we see how DNA has become one of the newest cyber threats. DNA testing companies…

NIST Cyber Security Framework Benefits.

An organization can benefit from the NIST cyber security framework because it will assist in implementing long term cyber security protocols necessary to protect and secure an organization’s networks. The NIST provides the frame of reference for a company to manage their cyber security risks. The framework of NIST is a very adaptable and flexible…