Vulnerabilities and Mitigation in SCADA Systems

Vulnerabilities  BLUF: Vulnerabilities of SCADA systems include risk of unauthorized access to softwares, lack of security controls, and out of date software. One benefit of SCADA systems is that they are easily accessible and controllable is also one of its biggest faults. It allows for anyone to be able to get into the networks and…

Benefits of the Cybersecurity Framework

The framework provides a guideline and loose structure for how a cybersecurity infrastructure should be created or maintained. It is beneficial to organizations with or without an existing system. For those with an existing system, they can use the framework to strengthen or find gaps within it. There are different levels and objectives in which…

Role of the CIA Triad in Organizations

CIA Triad BLUF: The CIA triad consists of confidentiality, integrity, and availability in order to keep data consistently protected, accurate, and accessible. The CIA Triad was developed as a way to enhance and structure information security in a company or organization. The three values of the triad are confidentiality, integrity, and availability. Confidentiality refers to…