As a Chief Information Security Officer, balancing funds between training and cybersecurity technology requires strategic decision making. Both training and cybersecurity technology are crucial in mitigating risks and lowering human risks. The main thing to do is to figure out what risk are higher and what training and technology can mitigate those risks. Prioritizing risks…
SCADA Systems and the Vulnerability of Critical Infrastructure Systems
Critical infrastructure systems such as power grids, water supply, communications systems and more are subject to being at risk of cybersecurity attacks. These critical infrastructure systems hold high vulnerability for cybersecurity attacks and systems need to be put in place to protect them from such. These infrastructures are crucial to society and governments and the…
The CIA Triad
What is the CIA Triad? The CIA Triad The CIA Triad is a model of rules and guideline policies used for information security. Being formed over many years as early as the 1970’s, the triad consists of confidentiality, integrity and availability (Chai 2022). Confidentiality The confidentiality component in the triad refers to the security of…