This article explains the importance of cybersecurity training and upgrading cybersecurity technology. An explanation of how cybersecurity training and upgrading cybersecurity technology should be balanced in an information security budget is also provided. Importance of Cybersecurity Training Ensuring that employees receive up-to-date cybersecurity training is one of the most important things a company can do…
Category: CYSE 200T
Works produced as part of CYSE 200T coursework.
Mitigating Vulnerabilities with SCADA Systems
This article explains vulnerabilities found in critical infrastructure systems. The role that SCADA – Supervisory Control and Data Acquisition applications play in vulnerability mitigation is also discussed. Critical Infrastructure Vulnerabilities Vulnerabilities in critical infrastructure include resource disparity, outsourcing complexity, natural disasters, human actions, and accidental or technical failures (Tal, 2018). Resource disparity is defined as…
Understanding the CIA Triad
This article contains a short description of each part of the CIA Triad – Confidentiality, Integrity, and Availability. The concepts of authentication and authorization are also described, and examples of both terms are provided. CIA Triad Overview The CIA Triad stands for Confidentiality, Integrity, and Availability, which are “the pillars of information security” (Cawthra et…