The Human Factor In Cybersecurity

During this week’s reading, you’ve been exposed to different points of view regarding human contribution to cyber threats.  Now, put on your Chief Information Security Officer hat.  Realizing that you have a limited budget (the amount is unimportant), how would you balance the tradeoff of training and additional cybersecurity technology?  That is, how would you…

SCADA Systems

In this write-up you will use the SCADA SystemsLinks to an external site. article, along with your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks. Keeping Critical Infrastructure Safe “SCADA systems are also used for monitoring and controlling physical processes, like the distribution of…

CIA TRIAD

Using the Chai Article (Links to an external site.), along with additional research you will conduct on your own, describe the CIA Triad, and the differences between Authentication & Authorization, including an example. The CIA Traid The CIA triad is confidentiality, integrity, and availability. The three make up a triangle, with each tip representing confidentiality, integrity, and…