{"id":120,"date":"2024-09-23T00:25:16","date_gmt":"2024-09-23T00:25:16","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2024-11-17T22:29:49","modified_gmt":"2024-11-17T22:29:49","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/briannaharden\/sample-page-2\/","title":{"rendered":"Home"},"content":{"rendered":"\n<p class=\"has-text-align-center\">Hello and welcome to my personal account. Click the link below to take you to my All About Me page.<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-align-center wp-element-button\" href=\"http:\/\/sites.wp.odu.edu\/briannaharden\/2024\/09\/23\/all-about-brianna-harden\/\">All About Brianna<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">Protecting Availability<\/h1>\n\n\n\n<p class=\"has-text-align-center\">As a CISO for a publicly trading company I believe having a strong DDoS system in place could help because it counters and defends against threats aimed specifically for network attacks. Trading companies could risk attacks that could intentionally overload the servers. Another protection is just developing security compliance programs and establishing security metrics.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"612\" height=\"344\" src=\"https:\/\/sites.wp.odu.edu\/briannaharden\/wp-content\/uploads\/sites\/37255\/2024\/11\/DDOS-ATTACK.jpg\" alt=\"\" class=\"wp-image-307\" style=\"width:839px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/briannaharden\/wp-content\/uploads\/sites\/37255\/2024\/11\/DDOS-ATTACK.jpg 612w, https:\/\/sites.wp.odu.edu\/briannaharden\/wp-content\/uploads\/sites\/37255\/2024\/11\/DDOS-ATTACK-300x169.jpg 300w, https:\/\/sites.wp.odu.edu\/briannaharden\/wp-content\/uploads\/sites\/37255\/2024\/11\/DDOS-ATTACK-534x300.jpg 534w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">SCADA Systems<\/h1>\n\n\n\n<p class=\"has-text-align-center\">The purpose of SCADA Systems is monitor and control complex systems like power grids and<br>water plants from one central location. Systems this complicated may experience complications<br>and vulnerabilities such as outdated technology or network security. Below we will explore some<br>of the vulnerabilities.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>SCADA Vulnerabilities<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>Cybersecurity Vulnerability: The security vulnerability has come into question because they<br>are possibly prone to cyberterrorism and cyberwarfare attacks.<br>Network Vulnerability: It is believed that if SCADA systems aren\u2019t connected to the internet<br>than it is safe from cybersecurity attacks. These systems were created prior to the creation of<br>the worldwide web resulting in the low security protocols.<br>Physical Security Vulnerability: SCADA systems are monitored and controlled physically,<br>which can result in destruction of the system with extreme consequences. Anyone can sabotage<br>the system including insider threats.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>Mitigating Risk<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>There are a few tactics that are taken to combat these vulnerabilities. Cybersecurity measures<br>should be increased to lower the risk of an attack on the systems. Things such as modernizing<br>the asset so that the asset may be better protected. Also, implementing things like VPNs and<br>firewalls can help prevent unauthorized access to the system. Network vulnerabilities can be<br>combated with RBAC. These controls limit access to everyone in the network, allowing those<br>with a need to know to do their jobs. Lastly, Physical Security can be fixed by establishing a<br>access protocol like having a badge to scan in data farms or areas SCADA systems are located.<br>In conclusion, it is vital that we keep up with the safeguarding of data systems like SCADA.<br>Discovering the correct solution to each possible risk is mandatory in system security.<br><\/p>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">The Human Factor in Cybersecurity<\/h1>\n\n\n\n<p class=\"has-text-align-center\">As a CISO, balancing the perfect tradeoff between training and cybersecurity technology is vital<br>to a productive corporation. Below is how I would allocate my limited funds.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>I chose to allocate my funding in percentages to avoid naming an actual amount for my funding.<br>I truly believe investing in cybersecurity technology is slightly more important than training. I\u2019d<br>allocate 70 percent of my funding to Cybersecurity Technology. As a CISO it\u2019s important that<br>our data is safe guarded properly and the technology it takes to do these things can sometimes<br>be pricey. This technology goes as far as protecting the network with Network security ensuring<br>strong firewalls and IDS are applied. Also preventing attacks on our data security by implanting<br>strong data encryption for our sensitive information.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>Next, I would allot the remaining 30 percent to company training. You are only as strong as your<br>weakest person. If a company purchases millions of dollars in cybersecurity technology, it<br>means absolutely nothing if employees are ignorant to the risk they are faced each day.<br>Employees are constantly targeted with phishing attempts for example. If employees are trained<br>to recognize these sorts of attacks, it would decrease the company\u2019s vulnerability.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>In conclusion, I believe this approach would best suit any company allocating funds among<br>cybersecurity technology and training.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"612\" height=\"323\" src=\"https:\/\/sites.wp.odu.edu\/briannaharden\/wp-content\/uploads\/sites\/37255\/2024\/11\/phishing-image.jpg\" alt=\"\" class=\"wp-image-308\" style=\"width:840px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/briannaharden\/wp-content\/uploads\/sites\/37255\/2024\/11\/phishing-image.jpg 612w, https:\/\/sites.wp.odu.edu\/briannaharden\/wp-content\/uploads\/sites\/37255\/2024\/11\/phishing-image-300x158.jpg 300w, https:\/\/sites.wp.odu.edu\/briannaharden\/wp-content\/uploads\/sites\/37255\/2024\/11\/phishing-image-568x300.jpg 568w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Hello and welcome to my personal account. Click the link below to take you to my All About Me page. Protecting Availability As a CISO for a publicly trading company I believe having a strong DDoS system in place could help because it counters and defends against threats aimed specifically for network attacks. Trading companies&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/briannaharden\/sample-page-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29798,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/briannaharden\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/briannaharden\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/briannaharden\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/briannaharden\/wp-json\/wp\/v2\/users\/29798"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/briannaharden\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/briannaharden\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":310,"href":"https:\/\/sites.wp.odu.edu\/briannaharden\/wp-json\/wp\/v2\/pages\/120\/revisions\/310"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/briannaharden\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}