ODU Logo

Cybersecurity Technology Society

Dalton Lewis II

CIA Triad and the deeper understanding between Authentication and Authorization

The CIA Triad is a guided policy for organizations to ensure the safety of their information. The most confusing terms in this policy are authentication and authorization. Authentication is a form of verification that processes a person’s or business’s informationto… Continue Reading →

Discussion: Opportunities for Workplace Deviance

Cyber technology has created many opportunities for workplace deviance by giving employees the ability to misuse and steal sensitive data from a company. This can be done in numerous ways but, some things that will cause major risks to that… Continue Reading →

Scada System Roles in securing vulnerable infrastructures

         Vulnerabilities in critical infrastructure                   Critical infrastructures must be always protected because they are extremely essential to the economy. There are many critical infrastructures that are key to our day to day lives, but the main one that will… Continue Reading →

The Human Factor

Trade off With the limited amount of funds that the company was granted, 35% of it will be spent on the employees and the other 65% will be spent on the cyber technology. The balance between training the employees and… Continue Reading →

Hello World!

This is a post. Use posts to update your blog.

© 2026 Cybersecurity Technology Society — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑