The Human Factor in Cybersecurity

BLUF: This proposal aims to identify the various viewpoints regarding human contribution to cyber threats. There will also be an explanation of the trade-offs of training and additional cybersecurity technology and how both factors can be balanced. As a Chief Information Security officer, there will also be a proposition of how the limited funds will…

SCADA Systems

BLUF: In this paper there will be a discussion about the Supervisory Control and Data Acquisition Systems (SCADA). Additionally, there will be an explanation of the vulnerabilities associated with critical infrastructure systems and how the SCADA applications play a role in mitigating the risks that may arise (“SCADA”, 2011). What are SCADA Systems?SCADA, which means…

CIA Triad

BLUF: In this paper there will be a discussion about the CIA triad, one of the most important models in cybersecurity. This framework is designed to guide policies for information security within an organization (Chai, 2022, p.1). CIA stands for Confidentiality, Integrity and Availability. There will be an exploration of each principle in this paper….