There are a myriad of methods in which people today can use technology for improper conduct in the workforce. For starters, those with proper knowledge, access, or equipment, can very easily hack into and damage vital data and systems remotely, preventing themselves from being caught. There are many instances of cyberattacks being the responsibility of…
Author: dcars006
The Three Pillars of Cybersecurity: Explaining the CIA Triad
This paper describes the concept of the CIA Triad and explains each pillar’s core ideas, demonstrates their benefits, and provides examples. The paper also compares and contrasts authorization and authentication, showcasing that they are fundamentally different systems. CIA Triad The CIA Triad is a baseline created by cybersecurity teams that provides guidance for both solving…
Explaining the Effects of SCADA Systems on Infrastructure
This paper demonstrates the vulnerabilities associated with the automation and digitization of key infrastructure systems, and provides examples of the scale and possibilities of a potential cyberattack. As well as this, the paper delves into SCADA systems, their importance in countering cyberattacks, and their own vulnerabilities. Infrastructure and its Vulnerabilities Infrastructure has become increasingly interconnected…