IT/CYSE 200T

CIA Triad and Authentication vs. Authorization

BLUF: The CIA Triad, Confidentiality, Integrity, and Availability, is the basis of information security. It makes sure that data stays private, correct, and easy to access. Authentication checks that users are who they say they are, and authorization checks what they can do and how they can access a system. By limiting who can view what and keeping private data safe, these principles help make the world a safer place.

The CIA Triad

The CIA Triad is one of the most important models used in cybersecurity to keep computers safe. It means three main things when it comes to keeping data secure: confidentiality, integrity, and availability.

Confidentiality is an important part of the CIA triad because it keeps private information from getting into the wrong hands or being shared without permission. People who have access to secret information often need special training in order to keep it private. This training usually goes over risk factors, the best way to choose a password, and how to spot social engineering tricks. This keeps users from accidentally breaking security. For example, making online banking require private information like account or routing numbers ensures that only people who are allowed to can see financial data. User IDs and passwords are both common ways to keep information private. To make things even safer, companies may limit the places where private information shows up and send it as little as possible. When things are very important, extra steps may be taken, like saving data on computers that are sealed off from the outside world or using hard copies. It is also important to keep access control lists and file rights up to date on a regular basis to protect privacy and keep secrets.

Integrity makes sure that the data being used is still accurate, dependable, and useful for what it was created for. Information integrity makes sure that data has not been changed or messed with, either on purpose or by accident. Malicious changes, like a hacker changing scores in a university system, can make information less reliable. Unintentional changes, like a power surge damaging a file or a user accidentally deleting data, can also make information less reliable. To avoid these problems, steps are taken such as using file permissions and version control to stop illegal changes and make it easy to get back data if needed. Checksums, including cryptographic ones, which check the security of the data can also be used to find any changes that were made by things other than people, like server crashes. Setting up regular backups and failsafe systems makes sure that data can be returned to the way it was before it was damaged. Digital signatures can also provide non-repudiation, which means that people can’t say they didn’t do things like log in or send messages

The third part of the CIA triad is information availability, which works to make sure that data and systems can be accessed when they’re needed, even when there are problems that come up out of the blue. This is done by keeping technology in good shape and making sure the operating system works right. Updating systems, making sure there is enough connection bandwidth, and avoiding bottlenecks are all important ways to keep things available. Hardware failures can be lessened with failover systems, RAID, high-availability clusters, and redundancy. For the worst-case situations, like natural disasters or fires, a complete disaster recovery (DR) plan can help. Putting backups in places that are geographically separate from each other and using extra security measures like firewalls can help protect against downtime and attacks, making sure that data is always available and safe.

Tools for Information Security

Authentication and Authorization are crucial concepts in security, they serve different purposes.

              Authentication is the process of making sure that someone is who they say they are. This is important for keeping information safe, especially in digital settings like ATMs and online accounts. In the past, identification was based on one of three things: what you know, what you have, or who you are. The most usual way is to use a user ID and password, which are based on something the user knows. This method can be quickly broken, though. You can’t always tell who someone is by something they have, like a card or key if it gets lost or stolen. Biometric security uses something about you, like your fingerprint or an eye scan, that is much harder to copy or steal. This is a safer way to log in. Multi-factor authentication (MFA) uses two or more of these factors to make it much harder for people who aren’t supposed to be there to get in. An RSA SecurID device, for example, makes a new code every 60 seconds. To confirm the user, you need both something you know (a PIN) and something you have (the device itself). A much higher level of protection is guaranteed by this set of factors.

              Authorization determines what the authenticated user is allowed to do within the system. This is also known as access control. Access control controls what actions users can take. Access Control Lists (ACL) and Role-Based Access Control (RBAC) are two types of access control methods. An ACL is a list that tells an information resource what actions certain people are allowed to take. Some people might be able to read, write, or delete, while others might not be able to do any of those things at all. ACLs are simple and easy to set up, but they get hard to handle as the number of users and resources increases, especially when changes need to be made to more than one resource. To fix this, RBAC makes managing access easier by giving users jobs and then permissions that are appropriate for those roles. This method lets administrators control who has access based on their job. This makes things safer and easier for administrators, especially in big businesses.

Conclusion

The CIA Triad, Confidentiality, Integrity, and Availability, forms the foundation of information security, ensuring data is protected, accurate, and accessible. Authentication verifies a user’s identity, while authorization determines what actions an authenticated user can perform. For example, in online banking, authentication confirms your identity, and authorization allows access to your own account while restricting others. Understanding these concepts is essential for creating strong security systems that balance user access and protection from unauthorized use.


SCADA Vulnerabilities

BLUF: By combining industrial control systems with SCADA systems, which keep an eye on and coordinate real-time processes well, SCADA systems are important for managing critical infrastructure. However, as they become more connected, cyber threats become more likely to affect them. Strong security measures are needed to lower the risks to national security and public safety.

Vulnerabilities in SCADA Systems

SCADA systems have changed from separate, private networks to platforms that can connect to the internet and work together. Because of this development, they are now vulnerable to many things, such as unauthorized access, cyber-attacks, insecure communication protocols, lack of network segmentation, software vulnerabilities, and physical security risks.

Unauthorized access- Many SCADA systems mistakenly think that physical protection alone is enough. But if someone who isn’t supposed to have access gets into the control software, they can change important parts of the infrastructure, which could cause problems or even disasters.

Cyber Attacks- Cyberwarfare and cyberterrorism could be used against SCADA networks. Malware, ransomware, and Distributed Denial of Service (DDoS) attacks can stop SCADA from working, which can affect important services like water supply, traffic control, and power distribution.

Insecure communication protocols- Older SCADA systems use old transmission protocols like Profibus and Modbus RTU, which don’t have security built in. Attackers can steal and change data if it’s not properly encrypted, which puts the security of the system at risk.

Lack of network segmentation- A lot of SCADA networks don’t have strong separation, which lets bad people move around inside the system once they get in. This raises the chance of problems affecting many people.

Software vulnerabilities- Hackers can often get into SCADA software through security holes. Additionally, some SCADA systems still use old operating systems that don’t get security patches, which makes them easy to hack.

Physical security risks– A lot of the attention in cybersecurity is on digital threats, but getting to SCADA devices physically can also be dangerous. Attackers can get around digital security if they get into network switches, routers, or control consoles.

Mitigating SCADA Vulnerabilities

Given these vulnerabilities, SCADA system designers and operators have implemented several strategies to enhance security and mitigate risks such as:

Network Security Measures – To keep an eye on and stop unauthorized entry, people use firewalls, Virtual Private Networks (VPNs), and intrusion detection systems (IDS). SCADA-specific filters are made to stop bad traffic that tries to access industrial control protocols.

Encryption and Secure Protocols – Modern SCADA systems use encrypted secure communication methods like IEC 61850 and DNP3 to keep data from being viewed or changed by people who aren’t supposed to.

Access Control and Authentication- Role-based access control (RBAC) makes sure that only people who are allowed to can change the settings for a SCADA system. Multi-factor authentication (MFA) makes things even safer by needing more than one way to prove who you are.

System Redundancy and Backup- SCADA systems usually have extra servers, backup power sources, and failover mechanisms that let the system keep running even when there are problems, like an attack or hardware failure.

Regular Software Updates and Patch Management- Updating SCADA software and running systems can help protect against security risks. Patch management that is automated makes sure that security changes are made quickly.

Network Segmentation and Isolation– Cross-network attacks are less likely to happen when SCADA networks are kept separate from business IT networks. By physically separating SCADA from other networks, air-gapped systems add an extra layer of security.

Whitelisting and Anomaly Detection- Application whitelisting stops software that isn’t supposed to be there from running on SCADA systems. This lowers the risk of malware attacks. Anomaly detection systems watch the data on a network and let operators know when something seems odd.

Operator Training and Awareness – There is only one weak link in a security chain. Comprehensive training programs make sure that engineers and people who work with SCADA can spot cybersecurity risks and act in the right way.

Conclusion

Critical infrastructure can’t work without SCADA systems, but as they become more connected, they become more vulnerable to cyber dangers. Cyberattacks, unauthorized access, and communication methods that aren’t secure all pose big threats to public safety and national security. SCADA apps, on the other hand, help to make these weaknesses less dangerous by using strong security measures like encryption, access control, network segmentation, and regular software updates. Even though technology is always changing, SCADA security must always be a top priority to protect the systems that people count on.


Balancing Cybersecurity Training and Technology on a Limited Budget

BLUF: If I were a CISO with a small budget, I would put teaching employees at the top of my list to cut down on human error, which is a major source of cyber threats. I would also carefully choose which technologies to invest in, such as firewalls and antivirus software. This balanced method makes sure that both well-informed people can make decisions and strong computers can protect everyone.

Prioritizing Employee Training

As a CISO, I know that one of the biggest threats to our safety is still people making mistakes, like falling for phishing scams or using weak passwords. These little mistakes can cause big security holes that hurt our customers, business, and image. That’s why I fully back giving all employees regular, useful cybersecurity training. Our people are our first line of defense when they know how to spot and dodge threats. Putting money into training is not only a smart move, but also a cost-effective long-term plan that makes our company safer and creates a culture of responsibility and awareness.

Strategic Technology Investments

              I know that having good cybersecurity also means having the right technology. Firewalls, antivirus software, and endpoint protection are all important parts of our defense plan. That’s why I put the most money into the most important automated solutions that cover a lot of ground and lower our risk. These tools make it easier to find and stop threats from happening. But no matter how advanced the tools are, they can’t take the place of smart people making decisions. In today’s changing cyber world, our company is really safe thanks to smart technology and well-trained team members.

Conclusion

In conclusion, balancing investments between employee training and cybersecurity technology is essential for building a strong, resilient defense. A strategy that combines skilled people with powerful tools is far more effective than relying on either alone. In today’s world of constantly evolving cyber threats, our smartest defense often begins with a well-informed and vigilant team.