Trying to balance a specific budget for any organization, business, or company is a difficult and stressing process. Being a chief information security officer and balancing a budget for cybersecurity is no exception; however, this challenge can be done with a strategic approach. -TrainingJust as with the majority of processes in life there always needs…
Understanding Critical Infrastructure and SCADA Systems
1. What is Critical InfrastructureCritical infostructure is considered one of the most essential networking systems to ensure public safety to a nation’s citizen by their government. To go further this kind of network is made up of a number of different systems that the government uses to provide everyday functions and processes for the people…
Business Components
Identify other components of a businessIn order for a business to be successful and thrive other components besides sales, HR, marketing, operations, and finance must be taken into consideration. I do believe that the five previously listed components are the basics but other components that should be included are leadership, and customer service. Where do…
Creating Cybersecurity Policies
Within a federal defense contractor company such as Consolidated Analysis Center Inc (CACI) how could one implement a security monitoring policy? In order to implement a security monitoring policy with CACI there are several key steps to ensure compliance with regulations and the protection of sensitive information. 1. Understand Regulatory RequirementsRelevant regulations such as the…
The CIA Triad
1. What is the CIA TriadWhat does the CIA Triade stand for, according to Chai (2022) in the article What is the CIA Triad? Definition, Explanation, Examples it is said that CIA Triad stands for “confidentiality, integrity, and availability” and that these three elements of the triad are “the most foundational and crucial cybersecurity necessities”….