{"id":133,"date":"2024-09-25T16:27:11","date_gmt":"2024-09-25T16:27:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2024-12-04T02:56:55","modified_gmt":"2024-12-04T02:56:55","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cphil021\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity, Technology, and Society<\/h1>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\">\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\">\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: center\"><b>CIA Triad, and the differences between Authentication &amp; Authorization<\/b><\/h2>\n<p><b>BULF:<\/b><\/p>\n<p><span style=\"font-weight: 400\">To this day the CIA Triad (Confidentiality, Integrity, Availability) are important factors in our world&#8217;s system of technology, that provide protection of our people&#8217;s data and information over the data space.\u00a0<\/span><\/p>\n<p><b>CIA Triad:<\/b><\/p>\n<p><span style=\"font-weight: 400\">The CIA Triad is a model designed to help protect and guide policies for information security within an organization. CIA Triad is known for Confidentiality, integrity, and availability. While people outside the information security community might hear the phrase CIA Triad and think \u201cconspiracy theory,\u201d those in the cybersecurity field know that the CIA Triad has absolutely nothing to do with the Central Intelligence Agency. Instead, the CIA triad has everything to do with keeping your organization\u2019s data, networks, and devices safe and secure, while strengthening the security posture of your organization. The CIA triad is widely accepted as a model in information security. It\u2019s not a singular doctrine and there was no one author. Rather the model appears to have developed over time, with roots as old as modern computing, pulling concepts from various sources. Ben Miller, vice president for Dragos, seems to be one of the few people who has done any digging on the origins of the triad.<\/span><\/p>\n<p><b>Confidentiality:<\/b><\/p>\n<p><span style=\"font-weight: 400\">Confidentiality is that only authorized users and processes should be able to access or modify data. This often means that only authorized users and processes should be able to access or modify data. It also includes protecting information from hackers with malicious intent, like limiting access to only authorized individuals within a certain organization.\u00a0<\/span><\/p>\n<p><b>Integrity:\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400\">Integrity is data should be maintained in a correct state and nobody should be able to improperly modify it, either accidentally or maliciously. It should be maintained in a correct state, kept so that it may not be tampered with, and should be correct, authentic, and reliable. A system with integrity keeps data safe from unnecessary changes, whether malicious or accidental. Cybersecurity professionals might implement access levels, enable tracking when making changes, and protect data when transferring or storing it.<\/span><\/p>\n<p><b>Availability:<\/b><\/p>\n<p><span style=\"font-weight: 400\">Availability-authorized users should be able to access data whenever they need to do so. Just as unauthorized users must be kept out of an organization\u2019s data, data should be available to authorized users whenever they require it. This means keeping systems, networks, and devices up and running. Ensuring availability in data systems can be tricky because it may compete with the other factors in the triad. One of the best ways to protect data is to limit access to it. If you have an information security role, you may have experienced pushback from customers or coworkers about information availability.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Differences between Authentication and Authorization:<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u201cAuthentication and authorization are fundamental concepts in information security, often used interchangeably due to their similar contexts. However, they serve distinct roles in the security process.\u201d<\/span><\/p>\n<p><b>Authentication:<\/b><\/p>\n<p><span style=\"font-weight: 400\">Authentication is the procedure that uses the system to verify that users are who they claim to be. These comprise passwords as well as the variety of identity-establishing methods that are available, such as biometrics, security tokens, cryptographic keys, and the like.<\/span><\/p>\n<p><b>Authorization:<\/b><\/p>\n<p><span style=\"font-weight: 400\">Authorization determines the right to access any data, but it doesn\u2019t mean that all data is accessible to the public. Most operating systems enforce confidentiality in this sense by having many files accessible only by their creators or an admin, for instance.\u00a0 One of the most important ways to enforce confidentiality is establishing need-to-know mechanisms for data access; that way, users whose accounts have been hacked or who have gone rogue can\u2019t compromise sensitive data.<\/span><\/p>\n<p><b>Some examples of Authentication and Authorization:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Authentication verifies a user\u2019s identity, while authorization determines what that verified user can access within a system.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Effective access control combines both authentication and authorization to provide a comprehensive security framework that safeguards sensitive data, and critical systems.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Properly implemented access control reduces the risk of data breaches, ensures compliance with regulations, and enhances overall organizational security and operational efficiency.<\/span><\/li>\n<\/ul>\n<p><b>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Work cites<\/b><\/p>\n<p><b>Coursera:<\/b><\/p>\n<p><span style=\"font-weight: 400\">Coursera Staff \u2022 Updated on Nov 29, 2023<\/span><\/p>\n<p><span style=\"font-weight: 400\">What Is the CIA Triad? | Coursera<\/span><\/p>\n<p><b>CSO:<\/b><\/p>\n<p><span style=\"font-weight: 400\">Fruhlinger Josh, in July 12, 2024<\/span><\/p>\n<p><span style=\"font-weight: 400\">What is the CIA triad? A principled framework for defining infosec policies | CSO Online<\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<h2 style=\"text-align: center\"><b>SCADA System Write-Up<\/b><\/h2>\n<p><b>BLUF:<\/b><\/p>\n<p><span style=\"font-weight: 400\">SCADA (Supervisory Control and Data Acquisition) are extremely useful in monitoring and controlling critical infrastructure like energy grids, water systems, and transportation networks. Although these systems are essential for normal operation, they are vulnerable to cyberattacks and unauthorized access. Factors such as physical security and measures taken to ensure that critical infrastructure is immune to malware infections are very vital to the integrity of the system.\u00a0<\/span><\/p>\n<p><b>Vulnerabilities with Infrastructure system:<\/b><\/p>\n<ul>\n<li><b>Secured physically (have intext citations)\u00a0<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Physical security represents an elemental aspect of security for SCADA systems. Sabotage would be prevented by ensuring physical security of the \u201ccomponents of these systems, including, but not limited\u201d to, servers and controllers. Common physical controls and measures include fencing, camera surveillance, and restricted access areas.\u00a0<\/span><\/p>\n<ul>\n<li><b>Infrastructure (have intext citations)\u00a0<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">\u201cCyberattacks on infrastructure systems can be very damaging\u201d, as the 2015 attack on the Ukraine power grid indicates. These hackers made their way inside SCADA systems, which caused a massive power outage affecting hundreds of thousands of people. Furthermore, this incident also brought to the forefront the urgency for SCADA systems&#8217; protection against any assault that can be either physical or cyber-based<\/span><\/p>\n<ul>\n<li><b>Unauthorized access\/virus infections (have intext citations)\u00a0<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">One of the greatest threats to SCADA systems is unauthorized access, which can allow introduction of viruses or malware. An unauthorized breach can be perpetrated by means of phishing attacks, insider threats, or exploitation of published or known software vulnerabilities.\u00a0<\/span><\/p>\n<p><b>Conclusion:<\/b><\/p>\n<p><span style=\"font-weight: 400\">SCADA systems provide a means of monitoring and controlling critical infrastructure, but they are also very susceptible to cyberattacks and unauthorized access. Security of the SCADA systems relies on a combination of physical security, updated software, and monitoring for unauthorized access incidents or malware infections. Connections among infrastructure systems become more intertwined; thus, a proactive approach to the security of SCADA systems is needed to safeguard national security and public safety.\u00a0<\/span><\/p>\n<p><b>References\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400\">Electrical4u<\/span><\/p>\n<p><span style=\"font-weight: 400\">SCADA System: What is it? (Supervisory Control and Data Acquisition) | Electrical4U\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">AI Assignment: What to do with Cybersecurity??<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: center\"><b>Analysis of Optimal Placement for the Cybersecurity Department<\/b><\/h2>\n<p><b>Introduction:<\/b><\/p>\n<p><span style=\"font-weight: 400\">In today&#8217;s digital landscape, cybersecurity is paramount for safeguarding a company&#8217;s assets, reputation, and operational integrity. As your publicly traded company embarks on establishing a cybersecurity program, determining the optimal organizational placement for the new department is crucial. This analysis evaluates the pros and cons of situating the cybersecurity department under four potential areas: Information Technology (IT), Finance, Operations, and direct reporting to the Chief Executive Officer (CEO).<\/span><\/p>\n<p><b>1. Cybersecurity Department Under Information Technology (IT)<\/b><\/p>\n<h3><b>Pros<\/b><\/h3>\n<ol>\n<li style=\"font-weight: 400\"><b>Alignment with Technical Expertise:<\/b>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">IT departments possess the technical knowledge and infrastructure necessary for implementing and maintaining cybersecurity measures. Placing the cybersecurity team within IT ensures access to necessary resources and technical support.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><b>Streamlined Communication:<\/b>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Cybersecurity often requires close collaboration with IT for tasks like network security, software updates, and incident response. Proximity facilitates quicker decision-making and efficient problem-solving.<\/span><span style=\"font-weight: 400\">What happens if the necessary software updates and collaboration aren\u2019t watching their systems and they could potentially get hacked?<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><b>Integrated Strategy:<\/b>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Embedding cybersecurity within IT allows for the integration of security protocols into the broader IT strategy, ensuring that security is considered in all technological initiatives.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><b>Resource Sharing:<\/b>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Shared resources such as personnel, tools, and budgets can lead to cost efficiencies and better allocation of assets.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<h3><b>Cons<\/b><\/h3>\n<ol>\n<li style=\"font-weight: 400\"><b>Potential for Limited Autonomy:<\/b>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">IT departments may prioritize operational objectives over security needs, potentially leading to conflicts of interest and insufficient focus on cybersecurity.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><b>Perception of IT-Centric Security:<\/b>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Positioning cybersecurity solely within IT might underrepresented its strategic importance to the entire organization, potentially limiting executive-level attention and support. <\/span><span style=\"font-weight: 400\">How is positioning cybersecurity solely within IT, being a limited executive-level to attention and support?<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><b>Risk of Silos:<\/b>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Cybersecurity initiatives might become siloed within IT, hindering cross-departmental collaboration and comprehensive risk management across the organization.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><b>2. Cybersecurity Department Under Finance<\/b><\/p>\n<h3><b>Pros<\/b><\/h3>\n<ol>\n<li style=\"font-weight: 400\"><b>Emphasis on Risk Management:<\/b>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Finance departments are inherently focused on risk assessment and mitigation, aligning well with the objectives of cybersecurity in managing financial and operational risks.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><b>Budgetary Control:<\/b>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Finance oversight can ensure that cybersecurity receives adequate funding and is considered a critical investment, rather than a cost center.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><b>Strategic Decision-Making:<\/b>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Integrating cybersecurity with finance can facilitate strategic discussions on the financial implications of security measures and investments.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><b>Regulatory Compliance:<\/b>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Finance departments are typically well-versed in regulatory requirements, aiding in ensuring that cybersecurity practices meet financial industry standards and compliance mandates.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<h3><b>Cons<\/b><\/h3>\n<ol>\n<li style=\"font-weight: 400\"><b>Lack of Technical Expertise:<\/b>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Finance departments may lack the necessary technical understanding of cybersecurity, potentially leading to misaligned priorities and ineffective security strategies.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><b>Potential Disconnect from IT Operations:<\/b>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Separating cybersecurity from IT can hinder collaboration and slow down the implementation of technical security measures.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><b>Limited Focus on Broader Security Issues:<\/b>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Finance-centric cybersecurity may overly concentrate on financial data protection, neglecting other critical areas such as operational technology, intellectual property, and customer data.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">Dear Boss,\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">I believe that the Cybersecurity department should be located near good communication rangers for residents in the area and close for employees to drive to the workplace so it would be easy to report directly to the CEO. Here in Norfolk Virginia, we have a good area near the coast side of Virginia where everyone is close to the business. This will help Some pros and cons to this idea, are where the building will be close to our employees and has connections to other buildings nearby. Some cons to the concept are the limited focus on border Security due to use being far from the mainland and we might potentially be disconnected from IT Operations which can cause some miscommunication to far out employees. In conclusion, placing your Cybersecurity department near the Coast of Norfolk Virginia is a great idea for the company along with helping out some of their employees, despite some of the cons.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">From your trusted worker Charles Phillips <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society &nbsp; CIA Triad, and the differences between Authentication &amp; Authorization BULF: To this day the CIA Triad (Confidentiality, Integrity, Availability) are important factors in our world&#8217;s system of technology, that provide protection of our people&#8217;s data and information over the data space.\u00a0 CIA Triad: The CIA Triad is a model designed&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cphil021\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29864,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cphil021\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cphil021\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cphil021\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cphil021\/wp-json\/wp\/v2\/users\/29864"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cphil021\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cphil021\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/cphil021\/wp-json\/wp\/v2\/pages\/133\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cphil021\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}