The CIA Triad

The CIA Triad is the core components to help guide security produces and policies of the company. I am going to go in-depth with the three core components and explain the differences between Authentication and Authorization. ConfidentialityThe first letter in the CIA Triad stands for confidentiality. The CIA Triad doesn’t have to do with the…

Windows Server 2016: Configuring and Managing Data Storage

Companies should move the basic disks to a dynamic disk. Some advantages of dynamic disks are compelling because they have more features than basic disks. On the other hand, using basic disks allow for backward compatibility. Basic disks use standard storage management like partitioning. In Windows 2008 it is limited to using basic disks because…

Windows Server 2016: Active Directory

What tools are used in Windows Server 2016 to install Active Directory? Here are the tools that you need to install Active Directory.• Active Directory Administrative Center• Active Directory Users and Computers Snap-in• Active Directory Sites and Services Snap-in• Active Directory Domains and Trusts Snap-in• Active Directory Administrative Center Snap-in• ADSI Edit Snap-in• Active Directory…

The Legal System Response to Technological Advancements

This blog post is about what our legislative bodies should be doing to respond more rapidly to our technological advancement as they have difficulties keeping up. I will go in-depth with the techniques/policies/produces we should deploy to help close the gap The ProblemLaw and technology have been going head to head since the boom of…

SCADA Systems

This blog post is about SCADA Systems explaining the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks. SCADA System Supervisory control and data acquisition short for SCADA is used to control the critical infrastructure such as water, waste, gas, and wind farms. SCADA also has facility-based processes…