This write-up will review the history, and the importance of the CIA Triad, as well as the differences between authorization and authentication. History of the CIA Triad While there is no official creator of the CIA Triad, the first mention of confidentiality was mentioned in a US Airforce Study about confidentiality in computer science. Integrity…
Are Cybersecurity Degrees Worth it?
Cybersecurity is one of the up-and-coming career paths with over one million jobs available worldwide. With many other career paths becoming obsolete, and their futures uncertain, many people are starting to change direction, and head towards cyber-focused jobs. Colleges are offering cyber-based bachelor’s degrees to their students. As an alternative cyber-certifications are starting to become…
What is Cybersecurity and My Introduction
In the 21st computers have become more publicly accessible than ever before. There are more computers in an average American household than many people even realize, these computers consist of more thought of machines like smartphones, but can also consist of unusual computers, like the washer and dryer machines. Because the world today has more…
Supervisory Control And Data Acquisition (SCADA) Write-Up
When imagining SCADA, one can imagine a railroad system. The stops are the different utilities that the program helps with, for example, stop one the streetlights, stop two the city water system, stop three being the electricity to the city. SCADA is the main hub from which the trains leave from. Finally, the operator uses…
The National Institute of Standards and Technology (NIST) Framework
The main benefit of the NIST is the uniformity among the users of the Framework. The Framework has the same five elements with the same tiers and sub-levels, that help keep intact the integrity of an organization’s cybersecurity. NIST allows organizations to see their businesses through cybersecurity rather than seeing cybersecurity through their business. One…