The CIA Triad

Among the more important concepts regarding the practice of cybersecurity is the confidentiality, integrity, and availability (CIA) triad. This triad primarily exists as a guide for information security policy within a given organization. The CIA triad is regarded by many within the cybersecurity field as a foundational concept within the practice, though it has drawn…

SCADA Systems Write-Up

The threats faced by Supervisory Control and Data Acquisition (SCADA) systems are in many ways similar to threats faced by other systems one might deal with when working in cybersecurity. The unique threats faced by SCADA systems, however, resolve around the unique nature of them. To understand this, it is vital to first understand how…

The Human Factor in Cybersecurity

The best policy in the given scenario would be to prioritize cybersecurity training, particularly as it relates to familiarizing employees outside of the IT department with cybersecurity practices. This is because the vast majority of breaches depend on a mistake on the part of someone within the target organization. There is no technology that is…

The Evolution and Expansion of IP

The most obvious difference between the internet in 2023 and 1982 is its size. In 1982, it was possible to know about everyone who had an e-mail address and list their full names and home addresses in a book Danny described as “deceptively large.” People only used what they needed in the earliest days of…

The Vital Protocols

1. One protocol that is very important in cybersecurity is the Transmission Control Protocol. 2. The transmission control protocol operates on a variety of port numbers such as Port 21, which is the control channel and Port 22, which is used for SSH (ActiveCountermeasures, 2021.) 3. The transmission control protocol allows data transfers in a…

The NIST Cybersecurity Framework

The NIST framework can benefit organizations because of its flexibility. Cyberthreats are always changing as threat actors learn how to thwart measures that previously prevented them from penetrating networks. The NIST framework is flexible and easy to use, meaning that it is relatively easy to implement it to construct new measures that can keep threat…