Group Discussion From this week’s Jonas Reading: How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge? Cyber threats are unpredictable, so I believe our approach to developing cyber-policy and infrastructure should prioritize being very adaptable. We need frameworks that can react and update rapidly in response to…
Write Up – The Human Factor in Cybersecurity
IntroductionIf I were the Chief Information Security Officer with a limited budget, I wouldprioritize the most effective and cost-friendly options in order to combat and preventcyber attacks. Balancing the trade-off of training and implementing additionalcybersecurity technology in the right way is essential.Human FactorFirstly, I would focus on preventing cyber attacks by training. Training employeesin extensive,…
SCADA Systems
Critical infrastructure systems, such as water treatment plants, gas pipelines, and powergeneration facilities, are essential for the functioning of modern society. However, they are increasingly vulnerable to cyber threats due to their reliance on interconnected digital systems.SCADA (Supervisory Control and Data Acquisition) applications play a crucial role inmitigating these risks by providing centralized control and…
Understanding the CIA Triad
Brenda FontanaUnderstanding The CIA TriadWhat is the CIA Triad and when do we need it?The CIA Triad is the base of information security, highlighting confidentiality, integrity,and availability, and providing a framework with policies to guide organizations (Hashemi-Pour& Chai, 2023). Confidentiality involves ensuring privacy by limiting access to sensitiveinformation, with methods such as encryption, access controls,…