Supervisory Control and Data Acquisition (SCADA), is a centralized system that is used to both monitor and control Industrial systems and processes. It consists of both the Human-Machine-Interface (HMI) and detection monitoring systems to provide real-time control and monitoring over their processes. Examples of SCADA use include water treatment plants, power generation facilities, pipelines, manufacturing,…
A review of Hacking Humans
The article on Hacking Humans: Protecting our DNA from cybercriminals brings about valid concerns such as the risk of our DNA profile being acquired by unauthorized individuals as the ultimate source of personal identifiable information, as well as its inherent permanence unlike that of a social security card which could be reissued, not to mention…
Ethical considerations of CRISPR Gene editing in the context of BioCybersecurity
With the digitalization of our most permanent form of identity, deoxyribonucleic acid (DNA), the blueprint of our existence, we must carefully consider novel vulnerabilities. As professionals, we are ethically obligated to explore new threat vectors and take appropriate action to mitigate these risks. A key consideration in the security of any system is that all input…
Protecting Availability in Critical Infrastructure
As the CISO of a publicly traded company, I would follow the NIST framework: Identify, protect, detect, respond, and recover. I would direct my department to inventory all of their equipment and ensure security updates and hardware replacement occur on a regular schedule. I would also assemble a team to perform risk assessments and classify…
The CIA Triad and Access Control principles
Sometimes referred to as the AIC to avoid confusion with the CIA Agency, Accessibility, Integrity, and Confidentiality form the backbone of cybersecurity, ensuring data is protected, accurate, and available only to those it should be in a timely manner. Confidentiality are rules that limit access to information, Integrity assures that information is trustworthy and accurate,…
Components of a business
In addition to the “typical business layout,” one will find many other entities that significantlyadd to the overall success of an operating business, such as Technical Support, Legal, Supply chain Management, Research and Development, and Operations. After realizing the typical structure is moreof a guideline rather than a set-in-stone way to organize a business, the…
The NIST Cybersecurity Framework
Organizations can directly benefit from using the NIST Cybersecurity Framework as either a template for creating a new cybersecurity program or as an overlay to existing operations to provide a unified structure for domestic and international cooperation to strengthen cybersecurity operations. The framework is intentionally stated as not a “one-size-fits-all” solution, but rather one that…