{"id":302,"date":"2023-04-13T21:59:04","date_gmt":"2023-04-13T21:59:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jpara007-\/?p=302"},"modified":"2023-04-13T22:24:28","modified_gmt":"2023-04-13T22:24:28","slug":"302","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jpara007-\/2023\/04\/13\/302\/","title":{"rendered":"Blogs for CYSE 200T"},"content":{"rendered":"\n<p>Hello! Here are a couple of my Write-Ups I did in CYSE 200T<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Write Up &#8211; The Human Factor in Cybersecurity<\/h2>\n\n\n\n<p class=\"has-text-align-left\"><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>Balancing the Tradeoff of Training and Additional Cybersecurity<br>Technology<\/strong><br>As cybersecurity threats continue to increase, organizations must prioritize their limited funds<br>between investing in training for employees and implementing additional cybersecurity<br>technology. Balancing the tradeoff between these two areas requires a comprehensive approach<br>that takes into account the specific needs and risks of the organization. While additional<br>technology can provide an important layer of protection, training employees is critical to<br>reducing the likelihood of successful cyberattacks.<br><strong>Assess the organization&#8217;s specific risks and needs<\/strong><br>Before deciding how to allocate funds between training and additional technology, it is important<br>to assess the organization&#8217;s specific risks and needs. This should include a comprehensive review<br>of current cybersecurity measures, as well as an evaluation of any recent incidents or<br>vulnerabilities. This assessment should also take into account the organization&#8217;s size, industry,<br>and any regulatory requirements.<br><strong>Evaluate the effectiveness of current cybersecurity technology<\/strong><br>Once the organization&#8217;s risks and needs have been identified, the next step is to evaluate theeffectiveness of current cybersecurity technology. This should include an analysis of any gaps in<br>protection, as well as an assessment of the technology&#8217;s ability to adapt to new threats. This<br>evaluation will help determine whether additional technology is necessary or whether existing<br>solutions can be optimized.<br><strong>Allocate funds based on risk and need<\/strong><br>Once the organization&#8217;s risks, needs, and required level of training have been identified, it is time<br>to allocate funds between training and additional technology. This should be done based on the<br>relative risks and needs of the organization, with a focus on minimizing the likelihood and<br>impact of successful cyberattacks. In some cases, it may be necessary to prioritize training over<br>technology or vice versa, depending on the specific circumstances.<br><strong>Conclusion<\/strong><br>Balancing the tradeoff between training and additional cybersecurity technology requires a<br>comprehensive approach that takes into account the specific risks and needs of the organization.<br>While additional technology can provide an important layer of protection, training employees is<br>critical to reducing the likelihood of successful cyberattacks. By assessing the organization&#8217;s<br>risks and needs, evaluating the effectiveness of current technology, determining the required<br>level of training, and allocating funds based on risk and need, organizations can create a<br>balanced and effective cybersecurity strategy. Continuous evaluation and adjustment will help<br>ensure that the organization remains protected against evolving threats.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>Cites scored:<\/strong><br>https:\/\/inductiveautomation.com\/resources\/article\/what-is-humanfactor-in-cybersecurity <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Write-Up &#8211; SCADA Systems <\/h2>\n\n\n\n<p class=\"has-text-align-left\"><strong>Understanding SCADA Systems and Their Role in Mitigating<\/strong><br><strong>Vulnerabilities in Critical Infrastructure<\/strong><br>The observation and management of crucial infrastructure systems require SCADA technology. These<br>fundamental assets could include electricity conduits, water refinement facilities or transportation<br>networks. Regardless though, these amenities are at risk from cyber attacks that have the potential to<br>lead to dire results (Inductive Automation,2021. To deter such threats whose vulnerability is known<br>through critical infrastructure system weaknesses alongside the application of SCADA tools in resolving<br>them leads us towards better safeguarding our imperative resources.<br><strong>What are SCADA systems?<\/strong><br>One way to remotely monitor and control critical infrastructure systems such as power grids, water<br>treatment plants, and transportation systems is through the use of Supervisory Control and Data<br>Acquisition (SCADA) systems. These types of control system use sensors or other measuring devices to<br>collect data from various remote locations that are then transmitted back to a central command center<br>for analysis using human-machine interfaces and programmable logic controllers among other storage<br>applications (Inductive Automation,2021). The information gathered by these SCADA tools can be used<br>further downstream towards decision-making processes with direct application into controlling an entire<br>infrastructural network&#8217;s backend operations without anyone having a presence.<br><strong>Vulnerabilities of critical infrastructure systems<\/strong><br>Critical infrastructure systems are vulnerable to a range of threats, including natural disasters, physical<br>attacks, and cyber attacks. Cyber attacks are particularly concerning as they can be carried out remotely, and their effects can be widespread and long-lasting. A successful cyber attack on a critical<br>infrastructure system can result in service disruptions, property damage, and even loss of life.<br><strong>Cyber threats to SCADA systems<\/strong><br>SCADA systems are particularly vulnerable to cyber attacks due to their reliance on interconnected<br>networks and the Internet of Things. SCADA systems often use legacy technology that may not have the<br>latest security features, making them easy targets for cybercriminals. Attackers can exploit<br>vulnerabilities in SCADA systems to gain unauthorized access, manipulate data, or cause physical<br>damage (Inductive Automation,2021.<br><strong>Best practices for securing SCADA systems<\/strong><br>To secure SCADA systems, it is essential to implement best practices such as limiting access to critical<br>systems, using strong passwords, and regularly updating software and hardware (Inductive<br>Automation,2021. Organizations should also conduct regular vulnerability assessments and penetration<br>testing to identify and address weaknesses in their SCADA systems.<br><strong>Conclusion<\/strong><br>Critical infrastructure systems are vital to the functioning of modern society, and it is essential to protect<br>them against cyber attacks. SCADA systems play a critical role in monitoring and controlling these<br>systems and mitigating risks. By implementing best practices and using advanced security features, we<br>can better protect our critical infrastructure systems and prevent potential consequences.<br><strong>Cites scored:<\/strong><br>https:\/\/inductiveautomation.com\/resources\/article\/what-is-scada <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Write-Up: The CIA Triad<br><\/h2>\n\n\n\n<p class=\"has-text-align-left\"><strong>CIA TRIAD<\/strong><br>The CIA triad is a model for information security that describes the three main areas of concern<br>for security: Confidentiality, Integrity, and Availability.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>What is the CIA Triad?<\/strong><br>Confidentiality refers to the protection of sensitive information from unauthorized access or<br>disclosure. Integrity refers to the protection of information from unauthorized modification or<br>alteration. Availability refers to the assurance that information is accessible to authorized users<br>when they need it.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>How is it used?<\/strong><br>Authentication and authorization are related but distinct concepts in the field of computer<br>security. Authentication is the process of verifying a user&#8217;s identity. This can be done through a<br>variety of methods, such as a password, a fingerprint, or a security token. Authorization is the<br>process of granting or denying access to a particular resource, based on the user&#8217;s<br>authenticated identity and their associated roles or permissions.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>Example<\/strong><br>For example, a bank&#8217;s website may use authentication to verify a customer&#8217;s identity by<br>requiring a login and password. Once the customer is authenticated, the website uses<br>authorization to determine what account information the customer is allowed to view and<br>what actions they are allowed to take (e.g. view account balance, transfer funds, etc.) based on<br>the customer&#8217;s account status and privileges.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong> Cites scored:<\/strong><br>https:\/\/inductiveautomation.com\/resources\/article\/what-is-ciatriad <\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hello! Here are a couple of my Write-Ups I did in CYSE 200T Write Up &#8211; The Human Factor in Cybersecurity Balancing the Tradeoff of Training and Additional CybersecurityTechnologyAs cybersecurity threats continue to increase, organizations must prioritize their limited fundsbetween investing in training for employees and implementing additional cybersecuritytechnology. Balancing the tradeoff between these two&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jpara007-\/2023\/04\/13\/302\/\">Read More<\/a><\/div>\n","protected":false},"author":24885,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jpara007-\/wp-json\/wp\/v2\/posts\/302"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jpara007-\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jpara007-\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jpara007-\/wp-json\/wp\/v2\/users\/24885"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jpara007-\/wp-json\/wp\/v2\/comments?post=302"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jpara007-\/wp-json\/wp\/v2\/posts\/302\/revisions"}],"predecessor-version":[{"id":321,"href":"https:\/\/sites.wp.odu.edu\/jpara007-\/wp-json\/wp\/v2\/posts\/302\/revisions\/321"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jpara007-\/wp-json\/wp\/v2\/media?parent=302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jpara007-\/wp-json\/wp\/v2\/categories?post=302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jpara007-\/wp-json\/wp\/v2\/tags?post=302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}