Category: Cybersecurity
-
Drone Technology Cybersecurity and Information Systems
Introduction In recent times, most organizations are adopting emerging technologies to match the high competition in the market. Information systems (IS) are a set of components, which are integrated and aimed at the collection, processing, and storing of data in providing information, digital products, and knowledge (Yaacoub & Salman, 2020). Cybersecurity is a technique that…
-
The Need for Cybersecurity Data Science
Table of Contents Introduction Analysis Conclusion References Introduction The data around companies is increasing rapidly, and so are cyber-attacks. All activities that employees do online produces new data and create a digital footprint that cyberattacks can exploit. Whereas organizations utilize machine learning and data science to maintain their systems and data gathering security, hackers use…
-
Equifax Case Study: Cybersecurity Measures
Introduction Ensuring the safety of the collected data is a considerable priority for numerous corporations. Large companies aiming to preserve the integrity of their knowledge often incorporate additional protection methods against potential hacking, cautiously guarding the personal data received from the customers. As is shown in the case of the Equifax breach, these measures are…
-
Mayo Clinics Cybersecurity Risk Analysis
Table of Contents External Risks to Hospital Security Internal Risks to Hospital Security Security Risk Assessments at Mayo Clinic Conclusions and Recommendations References Cybersecurity risks are some of the most prominent risks to emerge in the 21st century. With the ongoing digitalization of all medical records, hospitals become one of the primary targets for phishing,…
-
Confidentiality in Cybersecurity
In the modern communication world driven by online technologies, cybersecurity is essential. Confidentiality is one of the major concepts that contribute to the security of users online as well as their personal data used in online activities. When studying networking security concepts, I learned that confidentiality is a stepping stone to protecting digital data. Indeed,…
-
Cybersecurity in Healthcare Organizations
Healthcare organizations collect and store a lot of patients personal data, including health insurance information, birth dates, Social Security numbers, etc. In case of a data breach, unauthorized individuals may get access to all this information, thus compromising patients privacy. For example, in a cybersecurity incident that occurred in 2018, the personal information of 45,000…
-
Ethics in Cybersecurity and Software Engineering
Ethical philosophy as a whole implies a search for definitions and mechanisms for the systematic distinction between right and wrong. Applied in the field of cyberspace, the ethical principle demonstrates itself as necessary to protect users from unwanted invasions of privacy. It is required to consider and analyze two examples that show the similarities between…
-
Cybersecurity: The Role in Business
Cybersecurity frameworks may differ significantly depending on the way in which the data is stored. Data servers may require regular supervision and maintenance, whereas usage of the cloud partially delegates cybersecurity to the service provider (Michels and Walden 383). Hence, it may be essential to thoroughly analyze the market and choose the most secure and…
-
The Internet of Things Cybersecurity Improvement Act
As cybersecurity has been an intensely debated and widely researched issue, its application in the legislative context is also essential to explore. In the Security Magazine article, Henriquez (2020) discusses the Internet of Things (IoT) Cybersecurity Improvement Act and what it means for the public and the government. The reason behind the Acts signing into…
-
Russia-Ukraine War as Cybersecurity Challenge
Synopsis Applying existing knowledge to real cybersecurity threats is an excellent academic reflective strategy to conduct research and assess the quality of ones skills. Given the need to select the most recent cybersecurity events, I have decided to address the most pressing topic of recent weeks, namely the war that Russia has launched against Ukraine.…