{"id":233,"date":"2023-04-27T03:39:26","date_gmt":"2023-04-27T03:39:26","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/benjamindansoeport\/?page_id=233"},"modified":"2023-04-27T04:52:10","modified_gmt":"2023-04-27T04:52:10","slug":"free-writes-discussion-boards","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/benjamindansoeport\/free-writes-discussion-boards\/","title":{"rendered":"Free Writes \/ Discussion Boards"},"content":{"rendered":"\n<p>Overview <\/p>\n\n\n\n<p>In this CYSE\/IT-200T class, participating in discussion boards and free-writes has really improved my understanding. First and foremost, these exercises foster critical thinking because they force me to reflect carefully on the course material and organize my ideas into a logical argument or answer. Additionally, they encouraged teamwork and participation, gave me a chance to interact with my peers and gain insight from their differing viewpoints, and fostered cooperation. By participating in discussion boards and free-write assignments, I was able to improve my research abilities, communication skills, and ability to reflect on my own learning and development during the course. I was able to communicate with others more effectively, have a better comprehension of the course subject, and monitor my development over time by consistently taking part in these activities. Below I will post three of my favorite free-writes \/ discussion boards from this semester! <\/p>\n\n\n\n<p><strong>Write Up &#8211; The Human Factor in Cybersecurity &nbsp;Apr 12, 2023<\/strong><\/p>\n\n\n\n<p>A Chief Information Security Officer must comprehend the benefits of funding more<br>cybersecurity technologies and employee training. Both are essential for a good cybersecurity<br>stance, yet investing in one over the other can occasionally be viewed as more advantageous if<br>one were to have a restricted budget.<br>Businesses around the nation will probably invest more in cybersecurity technology in the<br>near future since the modern world is more technologically oriented. That cannot be used to<br>minimize the need of bringing up cybersecurity best practices and knowledge among staff<br>members, as it is a crucial component of any cybersecurity program. When it comes to an<br>organization&#8217;s security, employees may either be the weakest or the strongest link, and the<br>correct training can lower the likelihood that a breach will happen due to human error.<br>Regardless matter how much training a worker has had, the chance of a human error in<br>cybersecurity must also be considered. There are many other ways to deliver training, including<br>practical exercises, online learning, and traditional classroom instruction.<br>On the other hand, investing in cybersecurity technology is also necessary for protecting an<br>organization&#8217;s systems and data. It is sensible to periodically invest in cybersecurity because<br>technology is always changing. Firewalls, antivirus software, and event management (SIEM)<br>systems are just a few examples of the several types of cybersecurity solutions available. These<br>technologies offer protection from a variety of threats, such as malware and phishing attacks. It&#8217;s<br>crucial to evaluate the organization&#8217;s particular needs and identify the technology categories that<br>are most necessary.<br>While working with a limited budget, it is essential to prioritize expenditures based on the<br>particular risks and needs of the company. The organization&#8217;s weakest areas and the areas where<br>investments would have the most impacts can be found through a risk assessment. The cost and<br>profit of each investment must also be considered. For instance, spending money on a system<br>that provides a high degree of safety but is difficult for personnel to use might not be the best use<br>of resources. The same can be said about spending money on training that is either too wide or<br>not enough specific to the risks the company faces.<br>There\u2019s a lot of factors to consider when allocating a budget. To determine the areas where the<br>organization is most vulnerable, conduct a risk assessment. This will make it easier to decide<br>which areas demand the greatest focus and money. A risk assessment should be done to identify<br>the areas where the organization is most vulnerable. Making decisions about what needs the most<br>attention and resources will be made simpler as a result. Spend money on cybersecurity tools that<br>suit the organization&#8217;s unique requirements. Make sure the technologies are efficient and simple<br>to use while also taking into account the cost-benefit of each investment. Establish a strategy for<br>handling security-related issues. Planning ahead and getting trained for incident response can<br>help to lessen the effects of a breach and the expense of recovery.<br>In order to manage this trade-off effectively, a CISO must create a balance between<br>increased cybersecurity technology and training. While choosing expenditures within a<br>constrained budget, it is important to evaluate the specific risks and requirements of the<br>company. A risk assessment can help identify the areas that require the greatest attention and<br>financing, and investments should be evaluated based on their cost-benefit ratio. It is imperative<br>that staff members receive training on cybersecurity best practices, and cybersecurity<br>technologies should be appropriate for the firm&#8217;s particular needs. Prioritizing expenses can<br>maximize the effect of the CISOs&#8217; limited resources on the organization&#8217;s cybersecurity posture.<\/p>\n\n\n\n<p><strong>The &#8220;Short Arm&#8221; of Predictive Knowledge (Module 7, Reading 1)<\/strong><\/p>\n\n\n\n<p>Short-arm forecasts may be used to properly plan for how cyber-policy and infrastructure will change in the future. By examining historical data, they comprise projecting likely human behavior and anticipating expected results based on current influencing factors. Short-arm predictions can reveal information about the likelihood of various events even while precise future projections are unachievable. It&#8217;s important to remember that short-arm forecasts might not always come true and shouldn&#8217;t be relied upon too much.<\/p>\n\n\n\n<p><strong>Write-Up &#8211; SCADA Systems<\/strong> <strong>Mar 26, 2023<\/strong><\/p>\n\n\n\n<p>SCADA Systems<\/p>\n\n\n\n<p>Introduction<br>Systems vital to critical infrastructure, such as those used in the energy, oil and gas,<br>water, and electricity sectors, are susceptible to being attacked over the internet. SCADA<br>(supervisory control and data acquisition) refers to the systems used to monitor and control entire<br>sites. These sites can be anything from a single industrial plant to complex plants spread out<br>across the country. In terms of its application and use, monitoring and managing the physical<br>processes employed in contemporary civilization, such as water distribution, traffic lights,<br>electrical transmissions, gas transportation, oil pipelines, and other systems, may also be<br>accomplished with the assistance of SCADA systems (SCADA Systems, 2018).<br>Risk and vulnerabilities associated with SCADA<br>SCADA systems combine hardware and software that allow for the automation of<br>industrial processes. It is accomplished by capturing real-time data from sensors attached to<br>various equipment such as motors, pumps, and valves. SCADA systems are essential to the<br>modern industrial world. There is a common misconception that SCADA networks do not<br>provide a significant security risk since they are physically protected. Another common<br>misconception is that since SCADA networks are not linked to the internet, they are inherently<br>more secure than other networks. However, a survey conducted by Forrester found that between<br>the second half of 2018 and the first half of 2019, 56 percent of firms that use SCADA\/ICS<br>reported a breach in their systems (Paganini, 2021). Attackers target industrial control systems<br>(ICS), human-machine interfaces (HMI), and workstations to deliver malicious code and take<br>advantage of vulnerabilities affecting ICS. They can also launch distributed denial of service<br>attacks (DDoS) against vulnerable, unpatched systems that are accessible online and have<br>inadequate security.<br>Mitigation of Risks<br>SCADA systems provide real-time monitoring and control of industrial operations, which<br>makes it possible for these systems to assist in reducing the hazards associated with critical<br>infrastructure systems. SCADA systems link sensors that monitor equipment like motors, pumps,<br>and valves to an onsite or distant computer to collect real-time data from operational technology<br>(OT). OT refers to data that is collected in real-time. Because of this, enterprises can now swiftly<br>identify and react to cyber threats. In addition, SCADA systems can capture and save events for<br>the purpose of future reference or the development of reports. Hardware components of SCADA<br>systems, such as Remote Terminal Units (RTUs) and Programmable Logic Controllers (PLCs),<br>operate as local collecting sites for gathering sensor information and often activate actions of the<br>linked piece of equipment through the use of logic that has been pre-programmed. SCADA<br>systems may also be protected against unauthorized access by using precautions, including<br>network segmentation, access control, and regular software updates.<br>Conclusion<br>In conclusion, SCADA systems contribute to reducing risks by making it possible to<br>automate industrial processes and collect real-time data from sensors. It gives operators the<br>ability to recognize problems rapidly and take corrective action. Yet, SCADA systems are also<br>appealing to threat actors; thus, it is essential to put security precautions in place to reduce the<br>likelihood of adverse outcomes. Security is of the utmost importance because the destruction of<br>the systems would have severely negative effects. There are two key dangers to be concerned<br>about. The first threat is illegal to access to the program, which may take the form of human<br>intervention or modifications that have been purposefully generated. Other threats, as expressed<br>herein, included virus infections and other issues impacting the control host system. The second<br>potential risk is associated with the packet access to network segments home to SCADA<br>equipment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview In this CYSE\/IT-200T class, participating in discussion boards and free-writes has really improved my understanding. First and foremost, these exercises foster critical thinking because they force me to reflect carefully on the course material and organize my ideas into a logical argument or answer. Additionally, they encouraged teamwork and participation, gave me a chance&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/benjamindansoeport\/free-writes-discussion-boards\/\">Read More<\/a><\/div>\n","protected":false},"author":18378,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"open","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/benjamindansoeport\/wp-json\/wp\/v2\/pages\/233"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/benjamindansoeport\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/benjamindansoeport\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/benjamindansoeport\/wp-json\/wp\/v2\/users\/18378"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/benjamindansoeport\/wp-json\/wp\/v2\/comments?post=233"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/benjamindansoeport\/wp-json\/wp\/v2\/pages\/233\/revisions"}],"predecessor-version":[{"id":243,"href":"https:\/\/sites.wp.odu.edu\/benjamindansoeport\/wp-json\/wp\/v2\/pages\/233\/revisions\/243"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/benjamindansoeport\/wp-json\/wp\/v2\/media?parent=233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}