The Human Factor in Cybersecurity

As a Chief Information Security Officer (CISO) with a limited budget, I would makedecisions on how to use resources between training and cybersecurity technology. The balancebetween these two areas is dependent on an organization’s current security position, its risks, andits long-term security objectives.Look At Current StateBegin conducting an assessment on the organization’s current cybersecurity position.Understand…

The Role of SCADA Systems

Critical infrastructure systems include power grids, water supply, and transportationnetworks. They are the backbone of our daily lives, thus making their security and resiliencevery important (SCADA Systems). However, these systems are vulnerable to threats such ascyberattacks, natural disasters, and physical breaches. Supervisory Control and Data Acquisition(SCADA) systems play large roles in lowering these risks.Vulnerabilities in…

The CIA Triad

The CIA triad describes the most basic fundamental principle of cybersecurity.Authentication is validating a user’s identity. Authorization approves or denies a request toaccess certain data.The CIA TriadThe CIA triad can be broken down into three different sides: confidentiality, integrity, andavailability. Confidentiality has to do with the security of private data and documents. Upkeepconfidentiality can be…