Name: Angel DrakeDate: 02.23.2025 The CIA Triad Informational protection in business starts with confidentiality, integrity, and availability, which is the CIA triad; it protects information from unauthorized users, has accurate information, and is accessible to users. Beneficial to businesses is understanding that Authentication is the verification of your identity, and authorization is the level of…
SCADA Systems
Vulnerability of infrastructure systemsInfrastructure systems have been part of our tech world for centuries, but as the world evolves, so do the risks to them. Vulnerabilities are a weakness in the critical infrastructure systems, much like a solid window that has a crack, which makes it subject to shatter. A vulnerability for infrastructure is the…
The NIST Cybersecurity Framework
Using the framework is beneficial to improve the organization’s security procedures for future risks in their infrastructure by placing features to help them understand the risks and how to counter and protect them. This framework helps identify, protect, detect, respond, and recover. It is needed with cybersecurity risks, as protection of their privacy and civil…