Journal Entry #5: Individual Motives for Crime, ranked by me.

The motive that makes the most sense to me regarding why individuals commit crimes is for money, whether it’s due to financial reasons, greed, or financing the necessary resources needed to further their criminal activities. Multiple reasons is the next motive that I thought made the most sense due to factors such as socioeconomic and…

Journal Entry #2: Principles of Science in relation to Cybersecurity

The principles of science all relate to cybersecurity in different ways. Relativism is the understanding that all things are related when it comes to reliance on technology, meaning that a change in one system when it comes to cybersecurity can result in changes in other systems. Another principle of science that relates to cybersecurity is…

Journal Entry #1: Areas of Interest

The areas that would stand out the most to me in terms of interest would be more cybersecurity curriculum-related in terms of developing and planning education sessions for various organizations. I feel that I am very organized and take pleasure in creating PowerPoints, which would be used to explain different cybersecurity topics in an educational…

The Human Factor

The first thing I would do as a CISO is figure out and understand what the overall goals and priorities of the organization are. I would do this by interviewing my employees, as well as the midlevel leaders and customers to get a sense of the collective mindset, purposes, and priorities of the people that…

SCADA Systems and Cybersecurity Risks

Supervisory control and data acquisition (SCADA) systems are supervisory systems that are used to monitor and control critical infrastructure systems, being able to control entire sites even, including physical infrastructure processes like traffic lights, distribution of water, electricity transmissions, gas transportation and oil pipelines, production and manufacturing, power generation and many other systems used in…

The CIA Triad

The CIA triad (also sometimes referred to as the AIC triad to avoid confusion with the Central Intelligence Agency) is a model designed to guide policies for information security within an organization (Chai). The three letters stand for the three key elements/concepts that form the triad, Confidentiality, Integrity, and Availability. Confidentiality is described as a…