Who Are You, And What Are You Authorized To Do? Authentication Vs. Authorization

SUMMARY The CIA Triad consists of three cybersecurity components considered the most important concepts within information security: confidentiality, integrity, and availability. Understanding the difference between authentication and authorization is necessary to further understand the CIA Triad concepts. IMPORTANCE OF THE CIA TRIAD   NIST SP800-12r1: An Introduction to Information Security defines “Information Security” as “The…

Mitigation Of Vulnerabilities In Cis Using Scada Systems

SUMMARY  Critical Infrastructure Systems (CIS) are vulnerable to cyberattacks, infrastructure degradation, human errors, and natural disasters. Supervisory Control and Data Acquisition  (SCADA) systems can play a crucial role in mitigating these risk factors.  Critical infrastructure includes the vast network of highways, connecting bridges and tunnels, railways, utilities and buildings necessary to maintain normalcy in daily…

Exploring Attacks on Availability

The CIA Triad is a comprehensive framework for building secure and resilient systems. Availability, confidentiality, and integrity are the three core principles that build the CIA Triad. A failure in any core aspect can undermine the overall security posture and lead to operational, financial, or reputational damage. Availability ensures authorized users have reliable access to…