The CIA Triad

BLUF: The CIA triad consists of Confidentiality, Integrity, and Availability; and used as a model to guide policies for information security in any organization. Concepts of the CIA Triad Confidentiality is very similar to privacy. It is designed to protect sensitive information from unauthorized access. Different types of data have different security levels. Integrity involves…

The Vulnerabilities of SCADA Systems

BLUF: SCADA stands for Supervisory Control and Data Acquisition, it refers to the use of industrial control systems to control critical infrastructure, facility-based processes, and industrial processes. SCADA systems control important processes like our water and power grids but were not made to be secure, making them easier to hack into. What do SCADA Systems…

The Human Problem of Cybersecurity

BLUF: Humans cause all security problems in cybersecurity and do not have the ability tomanage them, unless we train and inform people to protect the companies. The Creation of Human Threats In 1971, the “Creeper Virus” was created. It was the first virus ever created and even though it did not create any harm, it…