SCADA Systems and Critical Infrastructure Vulnerabilities SCADA systems are in place for the management and surveillance of critical infrastructures, which may include water treatment facilities, power generation plants, and industrial processes. These systems, while extremely useful for efficient operations, also provide major vulnerabilities that can be exploited by adversaries. Vulnerabilities of Critical Infrastructure Systems One…
Category: CYSE 200T
The Human Factor in Cybersecurity
Human Factors and Technology for CISO Introduction: As a Chief Information Security Officer (CISO) with a limited budget, balancing the allocation of funds between employee training and cybersecurity technology is crucial for maintaining a robust defense against cyber threats. The decision, therefore, will be based on weighing the human factor in cybersecurity and the effectiveness…
Hacking Humans
DNA testing services have become increasingly popular due to human curiosity and advancements in digital technology. While the services can actually help in medical research, they also introduce severe security and privacy concerns. Digitized DNA opens up a whole new frontier called “cyberbiosecurity” that looks at the risks from digitizing life sciences data. DNA is…
The CIA Triad
Introduction The CIA Triad is a basic model of information security—the three tenets include confidentiality, integrity, and availability. These three form a conceptual foundation upon which organizations develop complete security policies and practices to safeguard information and systems (Chai, 2022; Fortinet). Confidentiality Confidentiality involves protecting sensitive information from unauthorized access (Chai, 2022). It includes measures…