The article provides excellent insight for the average user to reflect on their activities on the internet and correct any behavior that may lead to unforeseen consequences. The average internet user will probably not think twice about visiting illegal streaming sites hosting movies and TV shows to avoid paying a subscription or one-time fee. Using…
Category: Uncategorized
SCADA Systems
SCADA (Supervisory Control and Data Acquisition) systems, also known as ICS (Industrial Control Systems), aim to monitor and control infrastructure, facility-based and industrial processes. The modern SCADA system connects to the network like most other technologies through internet protocol (SCADA Systems, 2023). However, while these changes have made it easier to manage, it also raises…
CIA Triad: The Core of Information Security
The CIA acronym or AIC is Confidentiality, Integrity, and Availability and is the core of information security for organizations. The triad is the backbone of cybersecurity and is essential to organizations in developing security policies and evaluating potential technologies and products (Chai, 2022). The difference between Authentication and Authorization is that one allows access, and…
The Human Factor of Cybersecurity
As the newly hired Chief Information Security Officer tasked with the new cybersecurity initiative with a limited budget to implement additional network cybersecurity upgrades and train staff to be vigilant to potential cybersecurity threats, basic cybersecurity awareness training can enable the employees to be the eyes and ears for the Cybersecurity Incident Response Team (CSIRT)…