{"id":231,"date":"2024-01-16T17:30:14","date_gmt":"2024-01-16T17:30:14","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=231"},"modified":"2024-04-21T16:58:55","modified_gmt":"2024-04-21T16:58:55","slug":"ece-416","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cbelf001\/ece-416\/","title":{"rendered":"Write-Ups"},"content":{"rendered":"<p><strong>The Human Factor in Cybersecurity- April 22, 2024<\/strong><\/p>\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><em><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">In this write-up, we will introduce the meaning of CISO, its responsibilities, and how I, as a CISO, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">would balance the tradeoff of training and additional cybersecurity technologies. Taking measures <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">such as employee training and implementing other technologies is a tremendously efficient way to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">assure the security of a company.<\/span><\/em><\/div>\n<div><\/div>\n<div><\/div>\n<div class=\"textLayer\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">CISO <\/span><\/strong><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The Chief Information Security Officer (CISO) of a company has a very crucial role. In fact, the role <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">of a CISO is to supervise an organization and ensure the security of all its data and information. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Furthermore, just li<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ke in the \u2018What is a CISO?\u2019 article, the chief information security officer <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">performs the role of executing, enforcing, and elaborating security policies. As a result, he can <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">guarantee the protection of a company\u2019s entire system.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"><strong>What are the responsibilities of a Chief Information Security Offic<\/strong><\/span><strong>er?<\/strong><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">As the \u2018Understanding CISO<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Roles and Responsibilities: A Complete Guide? article says, a CISO has <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">many responsibilities, and his role could be considered pivotal for the organization\u2019s outcome. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Without a CISO, a company would be dishoriented and would lose all its power since it would be <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">considered easily attackable and vulnerable. Among the many responsibilities, a chief information <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">security officer needs to be capable of directing and handling the security team of an organization, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">making vital business-related decisions, taking precautions against any form of cyber attack, and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">finally being able to communicate efficiently with the different divisions of a company. By doing <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">so, all the eventual risks for a company can be reduced.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">What would a CISO<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2019<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">s priorities with a limited budget be?<\/span><\/strong><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">As stated in the \u2018How CISOs Prioritize Cybersecurity Spend\u2019 article, the estimated costs of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity breaches are unduly expensive. Therefore, CISOs need to be extremely careful when <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">analyzing the potential risks and problems so that they can allocate their limited funds in a useful <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and functional way. Personally, as the CISO of an organization with limited funds, I would give <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">prominence to employee training as well as investing in new cybersecurity technologies. A great <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">method suggested by the CSO article to give prominence to the last mentioned is the FAIR (Factor <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Analysis of Information Risk) method. This framework allows the translation of cybersecurity <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">events, such as risks, into fiscal terms, making it easier for chief information officers to prioritize <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">risks and wisely choose the correct allocation of funds. Additionally, as a chief information security <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">officer, I would invest in cybersecurity technologies by implementing all types of firewalls, data <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">encryption methods, and monitoring systems that would allow me to promptly detect problems <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and resolve them. Also, I would carry out employee training courses. With these training courses, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">employees can learn many different skills, avoiding unvoluntary mistakes. In short, I would spend <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">my limited funds on cyber technologies, monitoring incidents, and employee training. I am <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">confident in the fact that all these measures can greatly contribute to promoting stable and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">vulnerable-free organization.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\"><\/div>\n<\/div>\n<\/div>\n<div class=\"PageAnnotations\"><strong>Conclusion<\/strong><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-2\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Finally, the role of a chief information security officer is indispensable for the success, the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">protection, and of the confidentiality, integrity, and availability of an organization.<\/span><\/div>\n<div><\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div><\/div>\n<div class=\"textLayer\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">SCADA Systems- March 25, 2024<\/span><\/strong><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><em><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">In this article we discuss about the SCADA System, how its term came to light, what it consists of, what its <\/span><\/em><em><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">vulnerabilities are, and how they can be diminished. The SCADA System is an excellent method because it <\/span><\/em><em><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">allows industries to work in a quicker and easier way whilst ensuring problem resolution<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span><\/em><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">When did the term SCADA come to light?<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">According to the article \u201cSCADA: Supervisory Control and Data Acquisition,\u201d t<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">he term SCADA was first <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">introduced in the 20th century because there was the necessity to control machinery so that workers <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">wouldn\u2019t have to control the equipment manually. For this reason, many manufacturing plants started <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">using timers. By doing this, there was the possibility to control and supervise infrastructure processes <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">without the need to dispatch staff members on-site and control the devices. With time, people realized <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that the idea of using timers was working very well,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">but these timers weren\u2019t very accurate. Thus, th<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ere <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">was a need to have a more well-planned and effective system. In fact, from the 1950s onwards, computers <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">were used for industrial control purposes. Telemetry, a type of technology that allows to transmit and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">measure data from remote sources, which then gets analyzed to monitor and control a system, laid its <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">foundations; and finally, in the 1970s, the SCADA System was introduced. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This was of great help because it <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">allowed the control of industrial processes.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">What is SCADA?<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">In accordance with<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the \u2018SCADA System\u2019 article, the term SCADA is an acronym that stands for \u2018Supervisory <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Control and Data Acquisition\u2019. This system is an accumulation of<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">software and hardware programs that are <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">designed to control infrastructure processes, industrial processes, and facility-based processes. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The controlling actions are made possible thanks to the RTUs, or Remote Terminal Units, and by a program <\/span>called Programmable Logic Controllers (PLCs).<\/div>\n<div class=\"textLayer\">As a matter of fact, this program allows to control plants\u00a0 in a remote and local way, giving birth to control automated processes. The SCADA System is able to collect data, examine it, and process it in real time. When microprocessors like the Remote Terminal Units and Programmable Logic Controllers interact with the HMI (Human Machine Interface), and once the data is posted from processors to SCADA Systems, the human operators are able to take control. The HMI provides members of an industry with graphic information, and with a diagram, the personnel is able to view a representation of the plant in question. If the system has analyzed any problems, the operator can act remotely. In short, with this system, industries can control and monitor processes by recording, analyzing, and collecting data. This system is attached to sensors that monitor things like pumps, motors, and valves<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">(actuators). Then, the data can be reviewed, and based on the types of alarms given by the system, the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">human operator can decide whether to take decisions or not, and if yes, what actions can be taken. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Because of its efficiency, many gas, oil, and water treatement industries utilize the SCADA System.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Vulnerabilities and how can they be diminished?<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Despite being one of the most efficient control systems, SCADA could make some improvements. Most of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the vulnerabilities are due to the lack of physical security, out-of-date devices, fleeble passwords, and weak <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">authentication methods. However, the biggest problems are the consequences of the absence of security <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">control protocols that allow unauthorized people to access and control everything. Another problem is due <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to unauthorized people or viruses that make changes and affect the entire system. The \u2018SCADA System\u2019<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">article suggests that industries can overcome these vulnerabilities and avoid risks by implementing VPNs <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">(Virtual Private Network) and firewalls<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. In addition, based on the \u2018One Flaw Too Many: Vulnerabilities in <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">SCADA Systems\u2019 article, industries as well as using VPN and<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">firewalls, should also implement strict policies <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">for connecting devices to SCADA Systems, prevent the use of unknown and untrusted devices, and use <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">endpoint protection.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\"><\/div>\n<\/div>\n<\/div>\n<div class=\"PageAnnotations\"><strong>Conclusion<\/strong><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-2\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Lastly, SCADA Systems are pivotal for monitoring and controlling industrial processes remotely and in real <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">time. Nevertheless, significantly important actions must be taken in order to maintain an efficient, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cyberattack-free system and in provide a strong and hermetic structure, which should be the top priority <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">for an industry.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p><strong>The CIA Triad- February 5, 2024<\/strong><\/p>\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><em><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">In this write-up, we talk about the CIA Triad, what it is, when it was created, what it stands for <\/span><\/em><em><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and the important role it has. The CIA Triad, is the key to keeping all organizations and clients safe <\/span><\/em><em><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">from all the potential attacks of a system.<\/span><\/em><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">What is the CIA Triad?<\/span><\/strong><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">According to the Chai article, the CIA Triad also known as the AIC, so there are no mis-<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">understandings with the Central Intelligence Agency, is a model designed to protect all the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">information from data breaches and therefore, it is fundamental in order to keep all organizations <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">safe.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">What is stands for<\/span><\/strong><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">CIA<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Triad,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">is<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">an<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">abbreviation<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">of<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">C<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">onfidentiality,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ntegrity<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">A<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">vailability.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">With<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">confidentiality,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">it is intended that all data and personal information are kept private or<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">confidential. For example, a bank needs to take several different reforms to make sure that certain <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">data doesn<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2019<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">t reach people or even employees that aren<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2019<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">t authorized. To do that, it is crucial that <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">employees working in fields such as finance, are given specific roles inside the organization. Some <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">employees,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">depending on their specialization,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">should be allowed to have access to confidential <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">data others however, must be denied access. As a result, even though this doesn<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2019<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">t ensure 100% <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">safety, it helps to decrease the amount of<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201c<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">damage<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201d<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that can occur to organizations but also to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">clients<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">of<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">organization<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">at<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">issue.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Basically,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">it<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">prevents<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">unauthorized<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">personnel<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybercriminals from accessing data. Integrity. With integrity, all data must be accurate, consistant <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and trustworthy during it<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2019<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">s longevity. To fulfill this step, it is essential to carry out periodic backups <\/span>in the system. Updating data so that it keeps up with everything. Another thing which is also really <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">important, is making sure that even though some documents can be read, they can<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2019<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">t be edited. <\/span>Although it may seem basic, it is actually a huge step since thanks to this, we are able to keep data <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">integrity. Lastly, Availability.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Availability is another major step. With this step, we are able to<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">understand whether data is available or accessible to all the authorized staff.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">To accomplish the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">availability of data, like the Chai article states, there needs to be a porper maintenence of all the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">technical infrastructures and systems which keep data and display it.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Who created it?<\/span><\/strong><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">According to the CSO article, the CIA Triad doesn<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2019<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">t have a single creator. Ben Miller, who is a Vice <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">President at Cybersecurity firm Dragos, thinks that confidentiality, one of the three concepts of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the CIA Triad was made official in a US Air Force study in 1976. Followed by the other concept of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the Triad, Integrity, which was layed out in a paper in 1987. This paper talked about the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">importance of having to focus on data accuracy. Availability, the last component, was mentioned <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">in 1988 when the Morris Worm named after the creator (Robert Tappan Morris), infected many<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">computers with a very strong virus, becoming one of the first malaware in history to have caused <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">such a wide diffusion in making computers inoperable. The Triad, was established in 1998. In <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">addition, Donn Parker, a researcher for the security of information and fellow of the Association <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">for Computing Machinery, in one of his books titled:<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2018<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Fighting Computer Crime<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2019<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">suggested<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">extend the Confidentiality, Intergity and Availability Triad into six. In his model made up of six <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">components,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">he<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">added<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">on<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">top<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">of<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Confidentiality<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Availability,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Posession<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">or<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Control, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Authenticity and Utility.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\"><\/div>\n<\/div>\n<\/div>\n<div class=\"PageAnnotations\"><strong>Today<\/strong><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-2\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">According to another article (Splunk article), specialists in the cyber field think that the CIA Triad <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">won<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2019<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">t stop all the security problems whilst others say that the Triad needs to have more <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">components. On the contrary, Walter Haydock, a professional staff member for the House <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Committee on Homeland Security who was also a Marine Corps Ground Intelligence Officer, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">disagrrees. Reagrdless of the never-ending progression in technologyand threats, the CIA Triad still <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">shows it<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2019<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">s effectiveness.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Conclusion<\/span><\/strong><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">To conclude, the CIA Triad<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">is a great model designed to protect personal information of clients <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and organizations and is to this day, very efficent.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Human Factor in Cybersecurity- April 22, 2024 In this write-up, we will introduce the meaning of CISO, its responsibilities, and how I, as a CISO, would balance the tradeoff of training and additional cybersecurity technologies. Taking measures such as&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cbelf001\/ece-416\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28443,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/pages\/231"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/users\/28443"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/comments?post=231"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/pages\/231\/revisions"}],"predecessor-version":[{"id":323,"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/pages\/231\/revisions\/323"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/media?parent=231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}