The CIA Triad

The CIA Triad is an information security benchmark model used to evaluate the information security of an organization (Techopedia). The CIA Triad has no affiliation with the U.S. Central Intelligence Agency but the CIA stands for the models three principles: Confidentiality, Integrity, and Availability. Confidentiality means that only authorized users and processes should be able…

Workplace Deviance

Cyber technology has created many opportunities for workplace deviance. Some of these deviances are but not limited to, sharing sensitive data or information, keeping that information for yourself (storing), and breaking policies within the workplace. Some workplaces have a BYOD policy but with this policy, people may tend to get side tracked and forget about…

Protecting Availability

First, I would implement a firewall so that all traffic is monitored and filtered before coming through. Secondly, I’d encrypt all data so that its at least harder to get a hold of, which will prevent and or limit information from falling into the wrong hands. On top of the firewall and data encryption, I…

NIST Cybersecurity Framework

The NIST Cybersecurity Framework is a complimentary basis for cybersecurity risk management. Organizations can benefit from the NIST Cybersecurity Framework in many ways. One of the most obvious ways is that it will provide the organization with a common ground on Cybersecurity risk management. Having ground on this prevent the organization from taking losses, whether…

SCADA Systems

What Is SCADA?SCADA stands for “Supervisory Control And Data Acquisition”. It is a system that collects data in various ways at factories, plants, etc. SCADA is really a term that is used to portray management solutions and control. SCADA is currently being used in numerous industries. For example, Water Management Systems, Electric Power, Traffic Signals,…