CIA Triad & Authentication vs. Authorization

Jerome Crawford2/16/2025BLUFThe CIA Triad ensures data security through Confidentiality, Integrity, and Availability.Authentication verifies identity, Authorization grants access rights.1. The CIA TriadConfidentiality: Protects various data from unauthorized access.Example-Hospitals use encrypted databases to store patient records, allowing ONLYdoctors with credentials to access them.Integrity-: Ensures data accuracy and trustworthiness.Example-:Bitcoin uses blockchain technology cryptographic hashes to verify thattransactions aren’t…

Protecting Critical Infrastructure from SCADA Vulnerabilities

Jerome CrawfordMarch 24, 2025BLUFSCADA systems control our everyday services like electricity and water but havesecurity weaknesses. Organizations protect these systems through network defenses,access controls, And continuous monitoring.SCADA System VulnerabilitiesSCADA systems face three major risks !!!1. Outdated TechnologyMany SCADA systems still use older computers that unfortunately can’t run onmodern security software . For example, A 2021…

Title: 60/40 rule

Name: Jerome CrawfordDate :5/06/25BLUF : Spend 60% on cybersecurity tools like firewalls and antivirus and 40% on trainingour employees to spot scams all around . The tools stop most attacks, But our peopleare the last line of defense.Simple Plan for Limited Budget1. Buy Cybersecurity Tools 60% of BudgetWhy? Tools will take care of the heavy…