Allocating Limited Funds; The Tradeoff of Training and technology

In this article we discuss how I would allocate the limited funds available, keeping in mind the tradeoff of training and the potential advanced cybersecurity technology. Allocating Funds If I were appointed Chief Information Security Officer, I would ensure careful planning of the budget allocation, particularly for emergency situations. However, before distributing funds, it is…

Vulnerabilities and Mitigations of SCADA

In this article we discuss some of the vulnerabilities that are associated with criticalinfrastructure systems. We will also dive into how SCADA applications can mitigate those risks. Supervisory Control and Data Acquisition Supervisory Control and Data Acquisition, also known as “SCADA,” is an industrialcontrol system used to control physical processes. These processes range from watertreatment,…

Authentication vs Authorization in The CIA Triad

Bluf: In this article we discuss the differences between authorization and authentication along with the CIA Triad. The CIA Triad is crucial within information security, and both authorization and authentication are important factors that correlate with the CIA Triad. >? CIA(AIC) Triad The CIA Triad is an acronym that stands for confidentiality, integrity and availability….