How should markets, businesses, groups, and individuals be regulated or limited differently in the face of diminishing state power and the intelligification (Verbeek, p217) and networking of the material world? Verbeek explains that as technology becomes more “intelligent” and more connected to everything we do, it starts to shape society in ways that used to…
Write Up: The CIA Triad
The CIA triad serves as the foundational model guiding information security policies and control selection, encompassing confidentiality, integrity, and availability. As articulated by Wesley Chai, it is “a model designed to guide policies for information security within an organization,” maintaining significance due to its comprehensive coverage; nearly every security incident impacts one or more of…
Write-Up – SCADA Systems
BLUF: SCADA systems play a pivotal role in managing critical infrastructure.However, many were not originally engineered with cybersecurity as aprincipal consideration. As these systems have become integrated intocontemporary networks, they present attractive targets for malicious actors.The very technology that supports operations in power plants can, withoutrobust security measures, serve as vectors for significant cyberattacks. Introduction:Supervisory…
Cyber Roles & Responsibilities
In NIST Special Publication 800-12, “An Introduction to Computer Security: The NIST Handbook,” Chapter 3 talks about the important roles and responsibilities in an organization’s cybersecurity program. One key role is the System Administrator, who is part of the “Technology Providers. System administrators are the tech experts who design, set up, and keep an organization’s…
Components of a Business
When I picture a business, I don’t just see a company selling things or a bunch of people working together. I imagine it as a living body, where every part has a specific job to help the whole business stay healthy and successful. According to articles like Investopedia’s “The Basic Elements of Business Success,” the…
Discussion Board: The NIST Cyber Security Framework
When I delved into pages 1–21 of the NIST Cybersecurity Framework, a key insight emerged: the framework transcends mere security—it emphasizes structure and communication. It distills the vast and daunting realm of cybersecurity into five straightforward functions: Identify, Protect, Detect, Respond, and Recover. This simplification is a significant advantage for organizations, as it provides a…