In-transit threats and risk management in Maritime industry. Maritime transportation is a vital component of global trade, with an estimated 80% of international trade by volume and 70% by value being transported by sea. However, this reliance on maritime transportation also brings a range of security challenges, including the potential for in-transit threats. These threats […]
Firewalls Introduction Since the late 1980s, the word firewall has seen restricted use to portray a device that obstructs unwanted network traffic while enabling other traffic to pass. The 1st published definition of “contemporary” firewall encompassing the use of that term was in an article named ‘Practical Unix Security’ whose publication was in the year […]
Social media usage and cyber-crime Introduction With the increased level of exposure that people have on the current social media channels, it is very easy for a particular person to easily share his or her information. For example, the introduction of media channels that are more into gaining access to the users’ data such as […]
How to employees justify cyberloafing? Cyberloafing refers to the act of using the internet for non-work related activities during work hours. Despite the potential negative consequences for both the employee and the employer, it is a common occurrence in the modern workplace. In this essay, we will explore the various ways in which employees justify […]
The use of Blockchain technology in cybersecurity Blockchain technology is a decentralized system that uses cryptography to secure transactions and ensure data integrity. It was first introduced as the underlying technology for the cryptocurrency, Bitcoin, but has since been adapted for a wide range of applications, including cybersecurity. The use of blockchain technology in cybersecurity […]
Assessment 1: Case Study Introduction The Australian government has been working to strengthen the country’s cybersecurity frameworks and policies in response to a concerning trend of data breaches, particularly within the financial and healthcare sectors. Over the past four years, numerous high- assessment task profile data breaches have impacted many Australian organizations and their customers […]