The SCADA (supervisory control and data acquisition) Systems is used to control infrastructure processes (wind farms, gas pipelines, water treatment), facility-based processes (ships, space stations, airports), or industrial processes (manufacturing, production, refining). The concept of SCADA is that the system is the centralized control and monitoring point of the entire site or they tend to…
The Human Factor in Cybersecurity
Human behavior has a major impact on cybersecurity. Cybersecurity is more about human behavior than just technology because most security problems start with the people and their responsibilities of implementing can lead to chaos. By removing people and adding transparency to the cyber world can secure or protect data from being leaked. Many data security…
The CIA Triad
The CIA Triad is an information security model that is used to guide an organization’s policies or attempts, so the data can be secured. The three letters stand for confidentiality, integrity, and availability. Confidentiality is when only authorized users or processes can access and modify data. Integrity is when data has to be maintained in…
Workplace Deviance
Workplace deviance is having deliberate desire to cause harm or hurt an organization. For example, an unsatisfied employee decided to turn on their company for getting fired or believing they deserve more. Another form of workplace deviance in the cyber technology field would be if a fired employee before he left downloaded sensitive information and…
Designing the Public Sphere
Over the years, technology has evolved and continues to adapt to modern day society. Technology has been regulated or limited differently in markets, bussinesses, groups, and individuals in multiple ways over the course of time. The regulation or limitation of technology among businesses is used to protect the rights of the employees and corporations. When…
DB: Protecting Availability
The CISO is the chief information security officer and they are responsible for an organization’s information and data security. Over the years, the role has evolved and now it is more of an exchange between the CISO and VP of security within the organization. If I was CISO, I would be doing security operations, security…