Category: CYSE 200T Assignments
Write-Up: The CIA Triad
Authentication and Authorization in the CIA Triad https://www.nist.gov/image/cia-triad BLUF The CIA Triad is a cybersecurity model with the initialism of Confidentiality, Integrity, and Availability. Authentication verifies a user, and authorization determines what an authenticated user can do. The CIA Triad The CIA Triad, developed in the 1970s, identifies confidentiality, integrity, and availability as the three…
Write-up: SCADA Systems
Securing SCADA: Mitigating Cybersecurity Risks in Critical Infrastructure Image created with assistance from OpenAI’s ChatGPT and DALL·E BLUF SCADA systems face vulnerabilities due to legacy protocols, increased connectivity, and human factors. SCADA applications can mitigate these risks by incorporating redundancy, enhanced security, and training. SCADA System Overview Supervisory Control and Data Acquisition (SCADA), also known…
Write-up: The Human Factor in Cybersecurity
Optimal Cybersecurity Budgeting: Investing in People and Technology Image created with assistance from OpenAI’s ChatGPT and DALL·E BLUF The optimal allocation of a limited cybersecurity budget distributes 40% to employee training and 60% to technology. Assessment The first step as a Chief Information Officer would be conducting a comprehensive assessment of the organization’s cybersecurity posture….