Scenario In this discussion board, you are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)? My job as a CISO is to ensure that the information assets are protected. There are many different ways that I could protect the companies systems. For example,…
A Comprehensive Overview: Explaining the Vulnerabilities Associated with Critical Infrastructure Systems and how SCADA Applications Play in Mitigating these Risks
Bryce Cooper This document identifies and explains the vulnerabilities associated with critical infrastructure systems, and how SCADA applications play a role in mitigating those risks. What is Critical Infrastructure?Critical Infrastructure includes facilities, systems, and assets that are vital to the economy. “If one or more of those services were to meet their destruction or incapacitation,…
A Comprehensive Overview: Understanding the CIA Triad and the Differences Between Authentication and Authorization
Bryce Cooper This document both describes and reviews the acronyms that form the CIA Triad, and the distinction between Authentication and Authorization. Describing the CIA Triad The CIA Triad is a guiding model in information security used to guide cybersecurity policies and practices within a respected organization. The model is also referred to as the…