The Chief Information Security Officer has a lot of responsibilities, one main one being theresponsibility to properly and proportionately allocate funds between the training ofcybersecurity staff and the technology they will be trained to use. At first glance, thisresponsibility might seem easy to some but there are several factors in deciding where moneyshould go that…
Journal – Critical Infrastructure and How SCADA Helps
Critical infrastructure is everywhere in our society, and as described, it is an undeniablycrucial part of the modern age that ensures production and business operations move smoothlyand efficiently. However important these infrastructures are, though, there are variousvulnerabilities that they constantly face that involve environment or production errors. Thesevulnerabilities threaten to slow or even halt operations…
Discussion – Opportunities for Workplace Deviance
Q: How has cyber technology created opportunities for workplace deviance? Cyber technology has created many ways to be deviant in the workplace. From using tech like your phone or headphones inappropriately to stealing company data or installing malware into the network, the options for a clever, disloyal employee are numerous. With the latter, however the…
Discussion – Protecting Availability
Q: You are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)? With a publicly traded company, system availability is paramount to maintain at all times. If clients, staff and/or shareholders lose access for any amount of time, it can cause various degrees of…
Journal – The CIA Triad
Q: Describe the CIA Triad and the differences between Authentication & Authorization, including an example. The CIA triad is a guiding model that is used by organizations, companies and businesses to help ensure that their cybersecurity policies abide by the three main concepts it stands for – confidentiality, integrity and availability. These concepts that form…
Discussion – The NIST Cybersecurity Framework
Q: From your readings of pages 1 – 21 of the NIST Cybersecurity Framework, what benefit can organizations gain from using this framework, and how would you use it at your future workplace? The NIST Cybersecurity Framework is a living, constantly evolving document that is regularly updated by the NIST (National Institute of Standards and…