The CIA Triad is the core components to help guide security produces and policies of the company. I am going to go in-depth with the three core components and explain the differences between Authentication and Authorization. ConfidentialityThe first letter in the CIA Triad stands for confidentiality. The CIA Triad doesn’t have to do with the…
Author: jpeck002
Windows Server 2016: Configuring and Managing Data Storage
Companies should move the basic disks to a dynamic disk. Some advantages of dynamic disks are compelling because they have more features than basic disks. On the other hand, using basic disks allow for backward compatibility. Basic disks use standard storage management like partitioning. In Windows 2008 it is limited to using basic disks because…
Windows Server 2016: Active Directory
What tools are used in Windows Server 2016 to install Active Directory? Here are the tools that you need to install Active Directory.• Active Directory Administrative Center• Active Directory Users and Computers Snap-in• Active Directory Sites and Services Snap-in• Active Directory Domains and Trusts Snap-in• Active Directory Administrative Center Snap-in• ADSI Edit Snap-in• Active Directory…
The Legal System Response to Technological Advancements
This blog post is about what our legislative bodies should be doing to respond more rapidly to our technological advancement as they have difficulties keeping up. I will go in-depth with the techniques/policies/produces we should deploy to help close the gap The ProblemLaw and technology have been going head to head since the boom of…
SCADA Systems
This blog post is about SCADA Systems explaining the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks. SCADA System Supervisory control and data acquisition short for SCADA is used to control the critical infrastructure such as water, waste, gas, and wind farms. SCADA also has facility-based processes…
What benefit can organizations gain from the NIST Cybersecurity Framework, and how would you use it at your future workplace?
The NIST Cybersecurity Framework offers many benefits for companies to use. The reason I believe this is that it’s easy to understand the Framework, and you can use it to your advantage. The Framework also allows for companies to prioritize protocols that will improve their network security. As well can show what assets are at…