Protecting Availability

You are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)? If I were the CISO for a publicly traded company, I would implement multiple cybersecurity measures to ensure the availability of systems. These measures include firewalls and 2-factor authentication. Another big solution would…

Exploring Attacks on Availability

According to ScienceDirect, the definition of an attack on availability is “a type of security breach that targets the reliability, accessibility, and performance of computing resources and data. Availability attacks can disrupt access to data or certain services. For businesses, attacks on availability can prevent staff from accessing the information that they need to continue operations….

Human Factor in Cybersecurity

When faced with a limited budget for cybersecurity needs, the allocation of funds should be split between areas that need the most focus.  Cybersecurity Training and Technology  If I had a limited amount of funds to use towards cybersecurity training and technology, the first step would be to determine what the needs of the company…

SCADA Systems 

Critical infrastructure systems will always be a vital part of society but are increasingly vulnerable to cybersecurity threats. SCADA systems are vital for diminishing these risks through the use of remote management and collecting real-time data from RTUs.  Vulnerabilities Associated With Critical Infrastructure Systems There are many critical infrastructure systems that are crucial for society…

The CIA Triad: Balancing Confidentiality, Integrity, and Availability

Created in the 1970s, the CIA Triad has been used for decades to keep an organization’s data safe and secure. The CIA triad stands for confidentiality, integrity, and availability. These three components are declared to be the foundation of information security.  CIA Triad  Almost every business or organization has security measures put in place to…