Differences Between NIST Cybersecurity Framework 1.1 and 2.0 The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is a widely adopted guideline for managing and reducing cybersecurity risk. The transition from NIST CSF 1.1 to 2.0 represents a significant evolution, reflecting advancements in cybersecurity practices, technology, and threat landscapes. Expand the Scope of…
Author: eboli001
Balancing Cybersecurity Technology & Training Class Exercise
Introduction Balancing the investment between advanced cybersecurity technologies and employee training is critical for creating a solid defense against cybersecurity threats. As a CISO, I was asked to develop a budget for cyber technologies and training to safeguard against cybersecurity threats. This essay focuses on allocating a $1 million cybersecurity budget, balancing technology investments and…
SCADA Systems Vulnerabilities & Applications
What is SCADA? While SCADA is a vital system to protect as it protects critical infrastructures, it also has many vulnerabilities that can have devastating consequences if not protected. SCADA combines hardware and software that uses supervision and control of organizations like manufacturing plants, oil and gas plants, energy plants, and water and waste plants….
An In-Depth Analysis of the CIA Triad
What is the CIA Triad? The CIA Triad is a core concept in Cybersecurity, as it ensures the security of systems and the data inhabiting them. Confidentiality is essential to protect the privacy of all data types, including “personal information, public information, confidential information, and sensitive information” (Shea, 2022). Integrity maintains the trustworthiness of the…