Journal Entry One: NICE Framework

In my upcoming Cybersecurity career, the three categories of NICE framework that interest me the most are: Protect and Defend, Analyze, and Securely Provision. Active work on a watch floor (Protect and Defend) as a cyber analyst sounds the most appealing with plenty of action to boot. That position would create a work environment that…

The Human Factor in Cyber Security: Biggest Asset or Largest Vulnerability

People are an organization’s biggest asset. Our brains process information and store data differently than computers. We have the ability to empathize and use creativity in the workplace. Just as we bring a unique benefit to the workforce, people also create opportunities for “bad actors” to exploit. People have contributed to a large percentage of…

SCADA: Vulnerabilities Within Our Critical Infrastructure

Supervisory Control and Data Acquisition (SCADA) refers to a control system which allows critical infrastructure facilities to reduce manning by automating processes that historically required human interaction. This control system has many individual parts and can spread over a large area or facility. The system is centralized and remotely controlled, which increases efficiency. Water treatment,…

The CIA Triad: A Guide For Information Security

The CIA Triad is a model used by organizations to compartmentalize and secure information. The model focuses on three pillars: Confidentiality, Integrity, and Availability. As with the NIST Cybersecurity Framework, the CIA Triad can be used to evaluate an organization’s ability to evaluate and respond to threats.The Triad ExplainedAlthough the individual components were researched and…