Write up: the CIA Triad

As a Chief Information Security Officer hat with a limited budget in an organization, how would one go about balancing the tradeoff of training and additional cybersecurity technology while allocating said limited funds? Write Up – The Human Factor in Cybersecurity In order to balance the trade of training and cybersecurity in case of a…

In Class Exercise Commodore Hicks

Capt. Christina Hicks During her brief lecture highlighted a couple things she imparted.upon us future cybersecurity students, and what stuck with me was the innovation of the still.growing cybersecurity field as well as the attitude requirements necessary towards a successfulcybersecurity career. Capt. Christina Hicks imparted upon me without her having to say, which I concluded…

SCADA analysis paper

This paper covers the vulnerabilities associated with critical infrastructures and data.acquisition and the role SCADA applications play in mitigating these risks/vulnerabilities. Critical infrastructure systems before SCADA ventured on the expansion of industrial.production as a whole but without the proper auditing it is safe to say that critical infrastructure.were very prone to vulnerabilities and risks. Some…