Write-Up – SCADA Systems

                Chase knight                 June 15 2025               SCAD Systems                    SCAD modern society relies on critical infrastructure systems like power grids, water treatment facilities, oil pipelines, and transportation networks. “The following subsystems are usually present in SCADA systems:The apparatus used by a human operator; all the processed data are presented to the operator,A supervisory system that gathers all…

Write Up – The Human Factor in Cybersecurity

Chase Knight  June 22, 2025                    The Human Factor in Cybersecurity                   I’d dedicate a large chunk of our funds—about 60%—to training. Here’s why: top-tier tech is only as good as the people using it. Training would cover everything from basic security awareness for all staff (spotting phishing attempts, strong passwords, avoiding social engineering) to specialized skills…

Write Up: Exploring Attacks on Availability

Chase knightJune 21, 2025 Exploring Attacks on Availability An attack on availability is a form of cyber assault designed to disrupt orcompletely block legitimate users from accessing critical systems, services, or data.These attacks specifically target the availability component of the CIA triadConfidentiality, Integrity, and Availability a cornerstone of information security. Unlikebreaches aimed at data theft…

Discussion Board: Opportunities for Workplace Deviance

The technology has expanded opportunities for workplace deviance by providing new avenues for misconduct and amplifying existing ones. It has also allowed employees to act without accountability, while expanded access to sensitive information facilitates data breaches and intellectual property theft. Remote work, enabled by technology, reduces supervision and creates opportunities for time theft and resource…

Discussion Board: Ethical Considerations of CRISPR Gene Editing

Reply from CHASE KNIGHT CRISPR gene editing holds great promise for advancing medicine, but it also presents good ethical challenges, particularly in the field of BioCybersecurity. As genetic information is increasingly stored and processed digitally, it creates new opportunities for cyber threats. For example, the article “Malicious Code Written into DNA Infects the Computer that Reads…

Discussion Board: Protecting Availability

As the CISO of a publicly traded company, the availability of systems is paramount to maintaining business continuity, protecting shareholder value, and meeting regulatory obligations. I would apply these because the systems remain available, resilient, and compliant, thereby safeguarding the organization’s. 

Discussion Board: The NIST Cybersecurity Framework

The NIST Cybersecurity Framework gives organizations significant advantages by offering a flexible yet structured approach to managing cybersecurity risks. It improves risk management by enabling organizations to effectively identify potential threats, thoroughly evaluate their impact, and prioritize mitigation efforts based on risk level.The Cybersecurity framework is very helpful for organizations because it gives them an…

Write-Up: The CIA Triad

The CIA Triad is a key info security framework focusing on three maincomponents: Confidentiality, Integrity, and Availability. Confidentiality keeps sensitive info safeby making sure only authorized people can see it, using methods like encryption and two-factorauthentication. Integrity ensures data is accurate and trustworthy with tools like checksums andaccess controls. Availability means that authorized users can…