If I was the CISO of a publicly-traded company, I would implement protections such as intrusion detection systems and firewalls on my systems to ensure availability. An intrusion detection system monitors network traffic. this system will allow workers to closely analyze traffic over a network to find vulnerabilities or abnormal traffic patterns. An IDS alerts…
NIST Cybersecurity Framework
The Nist Cybersecurity framework can help refine an organization’s risk management process and uncover weaknesses in current activities. Although the framework is not a replacement for current cybersecurity processes, the framework can help organizations determine their current cybersecurity posture and identify a target state. Organizations can assess their approach to cybersecurity risk management with implementation…
The CIA Triad
The CIA triad is a cybersecurity model used all around the world. CIA stands for Confidentiality, integrity, and availability. These three concepts are integral to securing any I.T infrastructure. Referring to these concepts as a triad helps show the relationship and importance they share when implementing security policies. With these three concepts considered, one can…