Write Up – SCADA Systems

Details In this write up, I will discuss SCADA Systems and explain the vulnerabilities and risks associated with critical infrastructure systems and the role that SCADA application plays in militating against these vulnerabilities and risks. SCADA Systems SCADA systems are systems that contain software and hardware elements that make organizations have the ability to perform…

CYSE 200 – Discussion 3

How has cyber technology created opportunities for workplace deviance? Cyber technology created opportunities for workplace deviance. This is especially true as technology is becoming more prevalent and user friendly. While some employees may engage in deviance without expecting harm to be caused, other employees may engage in deviance with malicious intent. An employee may decide…

CYSE 200 – Discussion 2

You are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)? In order to ensure the availability of systems, there are certain measures that can be implemented and executed. The below protections and procedures should be used in order to ensure constant system availability:…

CYSE 200 – Discussion 1

What benefit can organizations gain from the NIST Cybersecurity Framework, and how would you use it at your future workplace? Organizations can gain many benefits if they utilize the NIST Cybersecurity Framework. One benefit includes having a common language being used. When multiple organizations are using the same framework, it is easier for administrators to…

Write-Up: The CIA Triad

The CIA Triad is a security model that is used to assist with the security infrastructure and security of an organization. The C stands for confidentiality, the I stands for Integrity, and the A stands for availability. According to Fruhlinger, when all three factors are integrated together, the “triad forces security pros to do the…