Some of my initial thoughts on cybersecurity are that it is an important aspect of almost every organization or business. Since almost every organization has some type of online presence, there is a need to protect themselves from a potential cyberattack. The potential loss for a business or harm to their reputation is large enough…
How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge?
The development of cyber-policy and infrastructure should be approached with a mindset that we cannot look too far into the future as far as trends and threats are concerned. Because total shifts in the trajectory of technology can unexpectedly happen, having a policy that can be re-evaluated and pivoted quickly is critical. As stated in…
Balancing training and cybersecurity technology with budget in mind
Since the human contribution to cyber threats is the highest, I would want to make the most efficient use of budget and resources in the position of Chief Information Security Officer. One way to accomplish this would be to have training at regular intervals with follow-ups and evaluations. By having the training regularly, employees should…
Critical Infrastructure system vulnerabilities and the role of SCADA systems
Critical Infrastructure information and vulnerabilities The systems that control critical infrastructure systems are vital for our current society to function; things such as water treatment and delivery, electricity, and traffic operations such as traffic lights are all things that, if they are interrupted or stopped altogether, could have very negative consequences so they must be…
The NIST Cybersecurity Framework
What benefit can organizations gain from using the NIST Cybersecurity framework, and how would you use it at your future workplace? Organizations are able to look at how their operations would be impacted by cyberattacks and develop a strategy that fits the amount of risk they are able to assume. If a cyberattack would affect…
The CIA Triad and Authentication vs Authorization
The CIA triad is a set of guidelines that form a model to guide policies for information security within an organization. Confidentiality, Integrity, and availability are the three elements that form the CIA triad. Confidentiality refers to the ability for an organization to maintain the privacy of data by preventing unauthorized access to that data….