While cyber technology has opened the doors to streamline company efficiency and workload, it has also opened up doors that advance common workplace deviance, and this deviance can harm a company’s internal infrastructure if not managed and stopped. As companies and jobs move towards a more digital and cyber-focused landscape, cyber…
The C.I.A. Triad: The Pillars of Cybersecurity
In this write-up, we will look at the Confidentiality, Integrity, and Availability Triad, an organizational model used in the CYSE industry to help guide policies and system designs. CIA Triad Overview The CIA Triad is an organizational model used in the field of cybersecurity to help “identify and reduce vulnerabilities…
Balancing the Budget: Human Training or Technology?
In this write up, we attempt to balance the tradeoff between employee training and additional cybersecurity technology within the confines of a limited budget. Based on the reasoning discussed below, a budget split of 70-30 should be given in favor of employee training because it would allow for the development of a strong…
Critical Infrastructure Risks and the Role of SCADA
In this write-up, we look at SCADA systems, an industrial control system used to help assist industrial infrastructure processes, and how they help assist in combatting vulnerabilities in critical infrastructure such as cyber-attacks, physical threats, and human error through the implementation of modern SCADA applications such as real-time monitoring, automation, and cyber and…